Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-01-2025 08:18
Static task
static1
Behavioral task
behavioral1
Sample
3.ps1
Resource
win7-20240903-en
windows7-x64
5 signatures
150 seconds
General
-
Target
3.ps1
-
Size
502KB
-
MD5
8760f349093248f3bdccf42dd3ae0e7b
-
SHA1
5f62db5603b5f5b94c60df316e6e4b4f7496c3a0
-
SHA256
c4d20704a829164ce29a889159964ce47eeeefa8b96d07e6ea4aca0f2a1be7e9
-
SHA512
1adf351eea29333153fdc06fd2063233ce202fa1e0025891156d4ce94eaa717139d7a8cf78a5a1c8ac8ebc719af2cb6d5188c4f1bc5d556ec008154752d049e9
-
SSDEEP
6144:U2s1zAOok9Y3sOGnuerPkwo67g3Lk7pyFV50GuGdtqphBddqyIFr2JdyPrnxiNHM:Ul1fOXZQuAbw6465ajImdALqpvfsifPl
Score
3/10
Malware Config
Signatures
-
pid Process 2672 powershell.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 3064 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2672 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2672 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2672 wrote to memory of 3064 2672 powershell.exe 31 PID 2672 wrote to memory of 3064 2672 powershell.exe 31 PID 2672 wrote to memory of 3064 2672 powershell.exe 31
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\3.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\system32\ipconfig.exe"C:\Windows\system32\ipconfig.exe" /flushdns2⤵
- Gathers network information
PID:3064
-