Resubmissions
29-04-2024 19:30
240429-x7vc2sah46 1029-04-2024 19:28
240429-x65gmaah25 129-04-2024 19:25
240429-x49zbsag74 1029-04-2024 04:45
240429-fdebasaf52 10Analysis
-
max time kernel
66s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
29-04-2024 19:25
Static task
static1
Behavioral task
behavioral1
Sample
de35dae3ef97e43e60f63cf0ded58d480c0e7effe6a93c936be8f94db8e8bee3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
de35dae3ef97e43e60f63cf0ded58d480c0e7effe6a93c936be8f94db8e8bee3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$INTERNET_CACHE/Counting.ps1
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$INTERNET_CACHE/Counting.ps1
Resource
win10v2004-20240419-en
General
-
Target
$INTERNET_CACHE/Counting.ps1
-
Size
281KB
-
MD5
a262219e61af791c944a87d07bac0075
-
SHA1
d74aeaa010271d13e1edc54bc73601e57f020c49
-
SHA256
0177bcf1e6862c139fae08a9c6027f68989b4f68a239b64fab7449d1c421ddc0
-
SHA512
116ce3a1349a17f8b14a5c2a35af9008d8ffbdeae5e3b2a22f9cedbb18f2af564cc8b7762b30c643265eb16907df02a5c75fb3d141db0646f46bf777b855febb
-
SSDEEP
6144:A6IANxWUO1LsAotpxlZsgGrinm/O/wmJp9b:l/xWUftpxlZsgGZmJp9b
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4544 powershell.exe 4544 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4544 powershell.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82