Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
19-10-2021 14:45
Static task
static1
Behavioral task
behavioral1
Sample
Attachment.jpg.lnk
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
Attachment.jpg.lnk
Resource
win10-en-20210920
Behavioral task
behavioral3
Sample
z.ps1
Resource
win7-en-20210920
Behavioral task
behavioral4
Sample
z.ps1
Resource
win10-en-20211014
General
-
Target
Attachment.jpg.lnk
-
Size
1KB
-
MD5
e025546ff8afc85a32191af5bb32a6d5
-
SHA1
499ba488f9c681d239d58f7b79f3a7186cfbdd8c
-
SHA256
c3cb6b49bc15bd2a2acd369b8f2bc5170e27c749852a60922faf328b029f8076
-
SHA512
b5959d4823e270c8121dbadf45348a1c2c32c68cdde67624bb288ccdd0d97a254cb6ad3a4a9958ecac878df48d72c52afc3fe1c02cea6d92f6a57ec914746e38
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 740 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 740 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1516 wrote to memory of 740 1516 cmd.exe powershell.exe PID 1516 wrote to memory of 740 1516 cmd.exe powershell.exe PID 1516 wrote to memory of 740 1516 cmd.exe powershell.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Attachment.jpg.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -w h -file z.ps12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:740
-