Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 17:07
Static task
static1
Behavioral task
behavioral1
Sample
612d46d700db7c8fba70499dac9c8ea85f5a783083f5debcc1d8268bedd28df8.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
612d46d700db7c8fba70499dac9c8ea85f5a783083f5debcc1d8268bedd28df8.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
$INTERNET_CACHE/Engineering.ps1
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
$INTERNET_CACHE/Engineering.ps1
Resource
win10v2004-20240412-en
General
-
Target
$INTERNET_CACHE/Engineering.ps1
-
Size
299KB
-
MD5
f802e07cff596069adb7aa7b480cfe1a
-
SHA1
4ef8653ed9236f1462a07418b3c6bda288f8040e
-
SHA256
84481313e393fff2d1523bd10af35fe074f29d05095a82cc42b162a1166b0fb6
-
SHA512
08426b2914a3543d27ad269e357bf3a75e815dbf2654ca94333d0cca24e03a5462d0b49836254aaa4bd257e3792c95408490440f1e8b2c56bd29958d121f58fa
-
SSDEEP
3072:k8Q10uXRcQPkskqj0xVIxlxvxRZa0x58g1GaSyM0:k8QuuXRR0VwzpRZa058gVz
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1620 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1620 powershell.exe