Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/01/2025, 13:16
Static task
static1
Behavioral task
behavioral1
Sample
0d7514389c3b6575c145ae81504baf30e1697953398d67e1b9cdd93c988f86f3.ps1
Resource
win7-20240903-en
3 signatures
150 seconds
General
-
Target
0d7514389c3b6575c145ae81504baf30e1697953398d67e1b9cdd93c988f86f3.ps1
-
Size
453KB
-
MD5
79fb1495a4971c693fe5b76f67eb8ee6
-
SHA1
449f323d5e86b28bc2ab67cad5c1b0694bbfa49f
-
SHA256
0d7514389c3b6575c145ae81504baf30e1697953398d67e1b9cdd93c988f86f3
-
SHA512
bbaa07457a5d120b08b1bafd9562d32d4b54f379174266843ef8fa8262bd9f2bb4eca91e003892bd73f76ee0398e174afd8ae8600708130b22caf0f622f5c1f9
-
SSDEEP
1536:zgqdW/z20+u4dXNR8WrlDnyDT2ybMVwO8zNdEunygsmj+oN8NGHbEh4WMx+m6y30:zWE+NPVFL2bUCUrNlKomLJVlCsspHG
Score
3/10
Malware Config
Signatures
-
pid Process 1668 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1668 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1668 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\0d7514389c3b6575c145ae81504baf30e1697953398d67e1b9cdd93c988f86f3.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1668