Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    28/01/2025, 05:40

General

  • Target

    0cfa73172ff58fb401536620b3e2da2f7eb0a837043c02cbfc7d2edb8c00fe0e.ps1

  • Size

    438KB

  • MD5

    674301ae02422ceb065a4174c7b9113a

  • SHA1

    ba0b9c514114aa9cc8eed504c770a4f9da0c5674

  • SHA256

    0cfa73172ff58fb401536620b3e2da2f7eb0a837043c02cbfc7d2edb8c00fe0e

  • SHA512

    aa70aa019b196ea338d5cd97f4b5296050e696a5a97b0ed4c4fbd4a23dc9e734fcd8cb56314c04814ebae2ec07645d86e536453fabb9dd3c4af13c6f8870f187

  • SSDEEP

    1536:TjdW/z20+u4dXNR8WrlDnnlVYw7VM4kD2Fq5AGGzeQz4JnImgzP8RiPmHnClK+dv:TjYw7Ev1P4RtluJs

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\0cfa73172ff58fb401536620b3e2da2f7eb0a837043c02cbfc7d2edb8c00fe0e.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2968-4-0x000007FEF59AE000-0x000007FEF59AF000-memory.dmp

    Filesize

    4KB

  • memory/2968-7-0x000007FEF56F0000-0x000007FEF608D000-memory.dmp

    Filesize

    9.6MB

  • memory/2968-8-0x000007FEF56F0000-0x000007FEF608D000-memory.dmp

    Filesize

    9.6MB

  • memory/2968-10-0x000007FEF56F0000-0x000007FEF608D000-memory.dmp

    Filesize

    9.6MB

  • memory/2968-9-0x000007FEF56F0000-0x000007FEF608D000-memory.dmp

    Filesize

    9.6MB

  • memory/2968-6-0x0000000002310000-0x0000000002318000-memory.dmp

    Filesize

    32KB

  • memory/2968-5-0x000000001B610000-0x000000001B8F2000-memory.dmp

    Filesize

    2.9MB

  • memory/2968-11-0x000007FEF56F0000-0x000007FEF608D000-memory.dmp

    Filesize

    9.6MB

  • memory/2968-12-0x000007FEF56F0000-0x000007FEF608D000-memory.dmp

    Filesize

    9.6MB