Resubmissions

20/01/2025, 22:03

250120-1ye4js1pgl 10

20/01/2025, 21:44

250120-1lsh4s1kbj 10

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/01/2025, 21:44

General

  • Target

    index.ps1

  • Size

    34B

  • MD5

    d83c49ed6318ba5e402c311cd7e55c3f

  • SHA1

    50520860840fab9b9aebf90b3e16f2466613d5d0

  • SHA256

    e4b94bbbc90229ebdfc4a28028890d73fc085f460e9dac460bb4192417b4d7d3

  • SHA512

    eb747e268fde9971416c156267a17a698e0a10209b48a75b2b77987fadc496b82e18e8441ccaac854feb37d828868e70469e45c4549db8587e01d171fc444e10

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\index.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1644
  • C:\WINDOWS\system32\WindowsPowerShell\v1.0\powershell.exe
    "C:\WINDOWS\system32\WindowsPowerShell\v1.0\powershell.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    0c755122b3cdc4e3f9043ae348d4967f

    SHA1

    a86d266f9a00a64e15f917daa3f540d23c97ae6e

    SHA256

    cc6a67ff6ff926cc63246dd8d10a5498c99f93c2a3bbedaede18af76f9b6594c

    SHA512

    fc4e1b0abc5646ffe9523bca3b2e7cd49072ac26a19910afb305361d38981ce060958c80cc1167bf1a8b3eb77103d67b218461fd51d2534fbc97cad30b328367

  • memory/1644-7-0x000007FEF5B50000-0x000007FEF64ED000-memory.dmp

    Filesize

    9.6MB

  • memory/1644-9-0x000007FEF5B50000-0x000007FEF64ED000-memory.dmp

    Filesize

    9.6MB

  • memory/1644-4-0x000007FEF5E0E000-0x000007FEF5E0F000-memory.dmp

    Filesize

    4KB

  • memory/1644-10-0x000007FEF5B50000-0x000007FEF64ED000-memory.dmp

    Filesize

    9.6MB

  • memory/1644-6-0x0000000002810000-0x0000000002818000-memory.dmp

    Filesize

    32KB

  • memory/1644-5-0x000000001B6F0000-0x000000001B9D2000-memory.dmp

    Filesize

    2.9MB

  • memory/1644-11-0x000007FEF5B50000-0x000007FEF64ED000-memory.dmp

    Filesize

    9.6MB

  • memory/1644-12-0x000007FEF5B50000-0x000007FEF64ED000-memory.dmp

    Filesize

    9.6MB

  • memory/1644-8-0x000007FEF5B50000-0x000007FEF64ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2856-18-0x0000000002AC0000-0x0000000002B40000-memory.dmp

    Filesize

    512KB

  • memory/2856-19-0x000000001B7E0000-0x000000001BAC2000-memory.dmp

    Filesize

    2.9MB

  • memory/2856-20-0x0000000001D10000-0x0000000001D18000-memory.dmp

    Filesize

    32KB

  • memory/2856-21-0x0000000002AC0000-0x0000000002B40000-memory.dmp

    Filesize

    512KB