Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-01-2025 09:27
Static task
static1
Behavioral task
behavioral1
Sample
c358e0a764cf471e8fbcad222793853b.ps1
Resource
win7-20240903-en
windows7-x64
4 signatures
150 seconds
General
-
Target
c358e0a764cf471e8fbcad222793853b.ps1
-
Size
368KB
-
MD5
7a0090d72fbfbfa03eb02050e93d2ed7
-
SHA1
66dc4bb7d8085d1fc894baf3271319a4329971bc
-
SHA256
24fc3c7f746c3a037df97368a44462353b48160e58bb5e2c238280bbd2c9468f
-
SHA512
aae5aacaa5d3bce53be878b4ef2f4bfee8a9085e67810f3f9acdea2ec4eb26f28d2caa23a62cf18562dd838cbcca50800992df14de5f5bc07c9d2079da8272c6
-
SSDEEP
6144:WVLvQRko6c7UCeRYR3XhR1a3Nz1hpMkW3Wggec5kQ39JO9Wejhv:WxQB6c7UfYpD1a3BGRgenQ39DK
Score
3/10
Malware Config
Signatures
-
pid Process 2412 powershell.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2412 powershell.exe 2412 powershell.exe 2412 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2412 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2704 2412 powershell.exe 32 PID 2412 wrote to memory of 2704 2412 powershell.exe 32 PID 2412 wrote to memory of 2704 2412 powershell.exe 32
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\c358e0a764cf471e8fbcad222793853b.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\system32\cscript.exe"C:\Windows\system32\cscript.exe" /nologo C:\Users\Admin\AppData\Local\Temp\tmpEADC.vbs2⤵PID:2704
-