Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
14/01/2025, 13:04
Behavioral task
behavioral1
Sample
S.ps1
Resource
win7-20241023-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
S.ps1
Resource
win10v2004-20241007-en
10 signatures
150 seconds
General
-
Target
S.ps1
-
Size
706KB
-
MD5
373aa878a5ad94612f42d3728b1a1d27
-
SHA1
5106a85b484db9cc017dd31806012166321322cb
-
SHA256
4debdf415ed87c8f1861030788ddc601f22018344a7fa8a36dda60ffc9865034
-
SHA512
806e7ec64adfff5878bb1ea85dfb78516abb9de6548ee81b4f6e361e46aea756a97056a7519cd4c6fe54e8785cd75123f8807b8eb6c7c63810362cbdb4946a2d
-
SSDEEP
1536:PDnAsypbJ+L1yQzAfggjuoBAHMVpWzb3mCoPXhfsQpjnEq24d7U4Vq51ru2TPOWf:SEx
Score
3/10
Malware Config
Signatures
-
pid Process 800 powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2452 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 800 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 800 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 800 wrote to memory of 2452 800 powershell.exe 31 PID 800 wrote to memory of 2452 800 powershell.exe 31 PID 800 wrote to memory of 2452 800 powershell.exe 31
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\S.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /TN GooglDocsViewer /XML2⤵
- Scheduled Task/Job: Scheduled Task
PID:2452
-