Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    24-02-2022 21:10

General

  • Target

    Attachment.jpg.lnk

  • Size

    1KB

  • MD5

    d1ff80bc7c989227fb15abde19228bad

  • SHA1

    8388cb716f544a7395d4794860b71766eb500200

  • SHA256

    0cf9c93c8d12ac79600311efc0c6a4dab7f34c18bd8321e03d7b0fcbba6d0279

  • SHA512

    c4bf377b85f94d6746c32c50aeb2e2ce8f680d4514587857a5217ae64ab06cc16959e55cfd6c61dc9e7693ee18aa10ec0f90b94e3c449d00464f196229cfff66

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Attachment.jpg.lnk
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1796
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -w h -file z.ps1
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:776

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/776-58-0x000007FEF56CE000-0x000007FEF56CF000-memory.dmp

    Filesize

    4KB

  • memory/776-59-0x0000000002970000-0x0000000002972000-memory.dmp

    Filesize

    8KB

  • memory/776-61-0x0000000002974000-0x0000000002977000-memory.dmp

    Filesize

    12KB

  • memory/776-60-0x0000000002972000-0x0000000002974000-memory.dmp

    Filesize

    8KB

  • memory/776-57-0x000007FEF2FA0000-0x000007FEF3AFD000-memory.dmp

    Filesize

    11.4MB

  • memory/1796-55-0x000007FEFBD71000-0x000007FEFBD73000-memory.dmp

    Filesize

    8KB