Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/03/2025, 02:56
Static task
static1
Behavioral task
behavioral1
Sample
26032025_0256_5823c289a1455.ps1
Resource
win7-20240903-en
3 signatures
300 seconds
General
-
Target
26032025_0256_5823c289a1455.ps1
-
Size
10.5MB
-
MD5
153b139f74bd9bfca8e5b4c3872e27dd
-
SHA1
8ac6fe8510c51c828c2c7654ac23adfe3efa5e9a
-
SHA256
5823c289a1455fc36302fc9ea4861c32dc022532a3294b307b8f46e7219ab530
-
SHA512
cd4c47d94cc19fb54996ff7826a6467ed72e98ad851207be7189f4a7d312324bb4edf1e8142ca6d1c690b074fcc8e4f481c88f3f5aeaf17c0eacf2814cfffc9f
-
SSDEEP
12288:kEzEDEGEOETEiEnE3EsExElEPeEPgEP+EPIEPjEPFEPXEPgEPvEP+EPt4EPtQEPx:/oYBZIlE0Xu6hrxzAisLExdB8q+cR
Score
3/10
Malware Config
Signatures
-
pid Process 2504 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2504 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2504 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\26032025_0256_5823c289a1455.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2504