Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/01/2025, 07:41
Static task
static1
Behavioral task
behavioral1
Sample
ab733235a722c734fb8f19160825cef1.ps1
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
ab733235a722c734fb8f19160825cef1.ps1
-
Size
681KB
-
MD5
ab733235a722c734fb8f19160825cef1
-
SHA1
162b73031c52d7356337479488d60c333f404fdd
-
SHA256
32e6d8538c6b1d47942918cef259a80e70f06feb0145d6e41d44ec5917435391
-
SHA512
64a26e92c00a7a61acf71fdf819874ef6ce976117ddcaa0bea5ea3d57e2c631ff5569fdea081c6a39c73aa3ae40b0c08a049d7233c2a7e94232543cb1c4e67f6
-
SSDEEP
12288:yfytehPmbJEW2WkiUHJcWzMkVjkMAkZZ7wyzDFBagP:5yWKV5jkUZUyzSgP
Score
3/10
Malware Config
Signatures
-
pid Process 2540 powershell.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2796 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2540 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2540 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2796 2540 powershell.exe 31 PID 2540 wrote to memory of 2796 2540 powershell.exe 31 PID 2540 wrote to memory of 2796 2540 powershell.exe 31
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\ab733235a722c734fb8f19160825cef1.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\system32\ipconfig.exe"C:\Windows\system32\ipconfig.exe" /flushdns2⤵
- Gathers network information
PID:2796
-