Analysis
-
max time kernel
123s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 17:07
Static task
static1
Behavioral task
behavioral1
Sample
612d46d700db7c8fba70499dac9c8ea85f5a783083f5debcc1d8268bedd28df8.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
612d46d700db7c8fba70499dac9c8ea85f5a783083f5debcc1d8268bedd28df8.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
$INTERNET_CACHE/Engineering.ps1
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
$INTERNET_CACHE/Engineering.ps1
Resource
win10v2004-20240412-en
General
-
Target
$INTERNET_CACHE/Engineering.ps1
-
Size
299KB
-
MD5
f802e07cff596069adb7aa7b480cfe1a
-
SHA1
4ef8653ed9236f1462a07418b3c6bda288f8040e
-
SHA256
84481313e393fff2d1523bd10af35fe074f29d05095a82cc42b162a1166b0fb6
-
SHA512
08426b2914a3543d27ad269e357bf3a75e815dbf2654ca94333d0cca24e03a5462d0b49836254aaa4bd257e3792c95408490440f1e8b2c56bd29958d121f58fa
-
SSDEEP
3072:k8Q10uXRcQPkskqj0xVIxlxvxRZa0x58g1GaSyM0:k8QuuXRR0VwzpRZa058gVz
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2508 powershell.exe 2508 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2508 powershell.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82