Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-01-2025 02:29
Static task
static1
Behavioral task
behavioral1
Sample
4154e02a0d922fefb72812b972808dbf6c3f0a9108f577b641c9a57cf8d8d342.ps1
Resource
win7-20240903-en
3 signatures
150 seconds
General
-
Target
4154e02a0d922fefb72812b972808dbf6c3f0a9108f577b641c9a57cf8d8d342.ps1
-
Size
525KB
-
MD5
5259076d6fd45bf7ddbb866c169541db
-
SHA1
67549b5a010f40a004558b2c250829c9dc4d869b
-
SHA256
4154e02a0d922fefb72812b972808dbf6c3f0a9108f577b641c9a57cf8d8d342
-
SHA512
17faa2a63e9cc2e927f517ce34bdfc17e4d2229b9eb745dcbabd84c2800e853c4fa9fb0e2ef7420f1d259137dc37394fe0e7e7972520de79067837f7cff7cfc1
-
SSDEEP
6144:eVe/8jH/fkbaAiHnVExoyZYwOiY1LBSUkf2jFgdIVgMbJN+5PVu1Zhn6w/lAVigM:eFwoW2h7dVI42CoeUJ2z6m20VFqwg2
Score
3/10
Malware Config
Signatures
-
pid Process 3020 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3020 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3020 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\4154e02a0d922fefb72812b972808dbf6c3f0a9108f577b641c9a57cf8d8d342.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3020