Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
28/01/2025, 13:15
Static task
static1
Behavioral task
behavioral1
Sample
75938ac69c673d67db37935a2c882a56d21f8085a326a61033a41c61a969353c.ps1
Resource
win7-20241023-en
3 signatures
150 seconds
General
-
Target
75938ac69c673d67db37935a2c882a56d21f8085a326a61033a41c61a969353c.ps1
-
Size
453KB
-
MD5
dfc24069261dc85eda81abcb07e55c69
-
SHA1
f630b39909c81d172d434bd2b59ec3a2fd855a97
-
SHA256
75938ac69c673d67db37935a2c882a56d21f8085a326a61033a41c61a969353c
-
SHA512
705cffd220ef303b45cfff7687946e52098166c0c7bf4f6973947786372a789df85233ebcd67b302a9b255fc08262e367356b057024190b23ef13d1a99e4e3eb
-
SSDEEP
6144:4ABE+NPVFL2bUCUrNlKomLJVlCssptqzo:JE+NPVFL2bUCUrNlKomLJVlCzso
Score
3/10
Malware Config
Signatures
-
pid Process 2516 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2516 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2516 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\75938ac69c673d67db37935a2c882a56d21f8085a326a61033a41c61a969353c.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2516