Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28/01/2025, 12:06
Static task
static1
Behavioral task
behavioral1
Sample
8f1c12f90ac2afb6baf5d40bf4122b62c3867d421eda1cd785443c51c7f8ada2.ps1
Resource
win7-20241010-en
3 signatures
150 seconds
General
-
Target
8f1c12f90ac2afb6baf5d40bf4122b62c3867d421eda1cd785443c51c7f8ada2.ps1
-
Size
170KB
-
MD5
73afa5b1daf85fdb1b64b0bfc8dd948f
-
SHA1
3c83cd3261d1fee840b6da054a84e4ab40df52f9
-
SHA256
8f1c12f90ac2afb6baf5d40bf4122b62c3867d421eda1cd785443c51c7f8ada2
-
SHA512
6e1a2fbec9aa4feaa2d52cdd5d253b08c7a09eaab1df8bf681be32ec2ac251937cc092200bfe2b1e101602ab2b092e5220862e68f97b9d40f19bf3dc9328e889
-
SSDEEP
3072:MQoHePgWgLgPG0WYRYwNWprNONXT+jGt6yjcL8hDcseHcTt6tPgzGJVvfP:MRHePgWgLYnRYwNWprNONX6Ct6R
Score
3/10
Malware Config
Signatures
-
pid Process 2340 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2340 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2340 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\8f1c12f90ac2afb6baf5d40bf4122b62c3867d421eda1cd785443c51c7f8ada2.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2340