Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-02-2025 04:40
Static task
static1
Behavioral task
behavioral1
Sample
fb70d59686e9c99b78c715127367fa46eea1359baf7ff6e0644ff19d0674359e.ps1
Resource
win7-20241010-en
3 signatures
150 seconds
General
-
Target
fb70d59686e9c99b78c715127367fa46eea1359baf7ff6e0644ff19d0674359e.ps1
-
Size
131KB
-
MD5
54fbe16bb5ff1ed4ef9ecdbfb97905ca
-
SHA1
f71d316766bd20b975c0b67d423e05d53fc59b93
-
SHA256
fb70d59686e9c99b78c715127367fa46eea1359baf7ff6e0644ff19d0674359e
-
SHA512
585a182fba0de848fa58d2243ddb6a27e9cea319728f1386b65f0f6baf398b88b1ec0274018604955db3b592ffbed3a61603b48f4c03ff975428476883cd57ca
-
SSDEEP
3072:U1I6D5sqVQ0p0qZAmJHeo6oTBUPn3m7oUQRDKzn6uIr352hiNY:X65zbp/imJ+o6oTBim7oUQR+6hp2v
Score
3/10
Malware Config
Signatures
-
pid Process 1824 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1824 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1824 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\fb70d59686e9c99b78c715127367fa46eea1359baf7ff6e0644ff19d0674359e.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1824