Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 17:25
Static task
static1
Behavioral task
behavioral1
Sample
New folder (6)/BoostrappersSv.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
New folder (6)/BoostrappersSv.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
New folder (6)/script/de.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
New folder (6)/script/de.ps1
Resource
win10v2004-20241007-en
General
-
Target
New folder (6)/script/de.ps1
-
Size
367KB
-
MD5
cfc9d90273c31ccf66d81739aa76306a
-
SHA1
ecab570041654b147b3dd118829e2f7ae668f840
-
SHA256
8bd127d689be65e45bb8d2a2ff66698200da97835809c6b56ec9e2929b70618a
-
SHA512
c9a5058b34c4045ff1b7ae25f1f47bff14d06b3a97b7b1f30da65618ca7aeb0638d79f4e1cea4773cd92d9dfa7f9d2203e5734d0cfe11ee2d2a460d6cec18380
-
SSDEEP
6144:F+QNkAjzYyqSFaPjON3Be0mzBWCj0Xs5HgIxBI0gql:cQLjMyvFaCN3mzBd5xy0gql
Malware Config
Signatures
-
pid Process 372 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 372 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 372 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\New folder (6)\script\de.ps1"1⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:372