Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    17-01-2025 06:15

General

  • Target

    i965652f-main/e.ps1

  • Size

    1KB

  • MD5

    84ff3e215169b9d832bc5d9e94e2b22b

  • SHA1

    569437882641b3a97da7bab31fa8f651aaadce45

  • SHA256

    1a947ef7a88e807d24d3b93be78c522784f3e674126c6b94cfcf553874de4ffa

  • SHA512

    386abf7ce946f9e223d84b1b1d1f0a6a8c32fc7bc22c04e7fbbf5b655133922537c92f6b2dfabcd7efde6a1e7434d7dc510a3cdb366bb1d49535ee8b55c70945

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\i965652f-main\e.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2564

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2564-4-0x000007FEF5D0E000-0x000007FEF5D0F000-memory.dmp

    Filesize

    4KB

  • memory/2564-6-0x0000000002240000-0x0000000002248000-memory.dmp

    Filesize

    32KB

  • memory/2564-5-0x000000001B610000-0x000000001B8F2000-memory.dmp

    Filesize

    2.9MB

  • memory/2564-7-0x000007FEF5A50000-0x000007FEF63ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2564-8-0x000007FEF5A50000-0x000007FEF63ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2564-9-0x000007FEF5A50000-0x000007FEF63ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2564-10-0x000007FEF5A50000-0x000007FEF63ED000-memory.dmp

    Filesize

    9.6MB