Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/01/2025, 00:05
Static task
static1
Behavioral task
behavioral1
Sample
c10d8c90ddf07b2e6a1167ceb755559ff7a1305cdf0b0aca78771903504f10ee.ps1
Resource
win7-20240903-en
3 signatures
150 seconds
General
-
Target
c10d8c90ddf07b2e6a1167ceb755559ff7a1305cdf0b0aca78771903504f10ee.ps1
-
Size
2KB
-
MD5
65c8115dabcc202be32249a26321fcad
-
SHA1
8789f4cd12c7b07168e1411433f64ddc20214603
-
SHA256
c10d8c90ddf07b2e6a1167ceb755559ff7a1305cdf0b0aca78771903504f10ee
-
SHA512
5bf9d9b35f0ad81f1e9e91497008b50d038d894dd73a6a5dc166a108aa63847cd0026dc3539f65a64dae6634451635c939c3c8afee5801c714298e17f101fe58
Score
3/10
Malware Config
Signatures
-
pid Process 2560 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2560 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2560 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\c10d8c90ddf07b2e6a1167ceb755559ff7a1305cdf0b0aca78771903504f10ee.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2560