Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/01/2025, 21:44
Static task
static1
Behavioral task
behavioral1
Sample
index.ps1
Resource
win7-20240903-en
General
-
Target
index.ps1
-
Size
34B
-
MD5
d83c49ed6318ba5e402c311cd7e55c3f
-
SHA1
50520860840fab9b9aebf90b3e16f2466613d5d0
-
SHA256
e4b94bbbc90229ebdfc4a28028890d73fc085f460e9dac460bb4192417b4d7d3
-
SHA512
eb747e268fde9971416c156267a17a698e0a10209b48a75b2b77987fadc496b82e18e8441ccaac854feb37d828868e70469e45c4549db8587e01d171fc444e10
Malware Config
Signatures
-
pid Process 1644 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1644 powershell.exe 2856 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1644 powershell.exe Token: SeDebugPrivilege 2856 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\index.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1644
-
C:\WINDOWS\system32\WindowsPowerShell\v1.0\powershell.exe"C:\WINDOWS\system32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD50c755122b3cdc4e3f9043ae348d4967f
SHA1a86d266f9a00a64e15f917daa3f540d23c97ae6e
SHA256cc6a67ff6ff926cc63246dd8d10a5498c99f93c2a3bbedaede18af76f9b6594c
SHA512fc4e1b0abc5646ffe9523bca3b2e7cd49072ac26a19910afb305361d38981ce060958c80cc1167bf1a8b3eb77103d67b218461fd51d2534fbc97cad30b328367