Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-02-2025 16:13
Static task
static1
Behavioral task
behavioral1
Sample
target.ps1
Resource
win7-20240903-en
4 signatures
150 seconds
General
-
Target
target.ps1
-
Size
76B
-
MD5
a7719ce770225ad8fd81d6ad8ee8eec2
-
SHA1
bf61e43b55a0c29362e4e152cc77040981a4fd17
-
SHA256
3f7920a0497fdf8ee49a81e8c1ded39ac30610a758589086e5aad0cd3ccd26f9
-
SHA512
9a0feb19432c689ee5edeb2438f4a2d652f10b68539968fa4ff84b17c6df5e3b2831823051994f4a45829ba78eb2c6281cb72da666769a00ca37687f6c01b6ac
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 2736 powershell.exe -
pid Process 2736 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2736 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2736 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\target.ps11⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2736