Analysis

  • max time kernel
    43s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    03-06-2022 12:15

General

  • Target

    Scan_660.jpg.lnk

  • Size

    1KB

  • MD5

    29cac9f4a4b2cbc6606c0a7751b8b378

  • SHA1

    1d79526b5e9a77d7c4c1f6b4454a935cbee58706

  • SHA256

    5d95b0022d4c258df18fd392ff033a13d21a9b78279f88fdbc04da53ca5a124d

  • SHA512

    1ec8cd6845af4cfdb49570ca0f6437869f637e96f146bff76f9d1dc12ca667af5edc6c3ce8a75666a3735912ca3f58cc51af78ab3b4cbe50197b347361a3f69d

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Scan_660.jpg.lnk
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -w h -file 1127.ps1
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:884

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/884-104-0x000007FEF6D80000-0x000007FEF6E65000-memory.dmp

    Filesize

    916KB

  • memory/884-95-0x000007FEF53A0000-0x000007FEF627C000-memory.dmp

    Filesize

    14.9MB

  • memory/884-111-0x000007FEF3040000-0x000007FEF36E5000-memory.dmp

    Filesize

    6.6MB

  • memory/884-102-0x000007FEF6F20000-0x000007FEF6F52000-memory.dmp

    Filesize

    200KB

  • memory/884-103-0x000007FEF6E70000-0x000007FEF6F1A000-memory.dmp

    Filesize

    680KB

  • memory/884-98-0x00000000023C4000-0x00000000023C7000-memory.dmp

    Filesize

    12KB

  • memory/884-97-0x000007FEF7110000-0x000007FEF71C2000-memory.dmp

    Filesize

    712KB

  • memory/884-99-0x000007FEF3E10000-0x000007FEF496D000-memory.dmp

    Filesize

    11.4MB

  • memory/884-96-0x000007FEF4970000-0x000007FEF5393000-memory.dmp

    Filesize

    10.1MB

  • memory/884-100-0x000007FEF3AE0000-0x000007FEF3E0E000-memory.dmp

    Filesize

    3.2MB

  • memory/884-93-0x000007FEF4970000-0x000007FEF5393000-memory.dmp

    Filesize

    10.1MB

  • memory/884-88-0x0000000000000000-mapping.dmp

  • memory/884-94-0x000007FEF3E10000-0x000007FEF496D000-memory.dmp

    Filesize

    11.4MB

  • memory/884-101-0x000007FEF70A0000-0x000007FEF7109000-memory.dmp

    Filesize

    420KB

  • memory/884-105-0x000007FEF6C60000-0x000007FEF6D78000-memory.dmp

    Filesize

    1.1MB

  • memory/884-107-0x000007FEF38C0000-0x000007FEF3AD6000-memory.dmp

    Filesize

    2.1MB

  • memory/884-108-0x000007FEF2ED0000-0x000007FEF303C000-memory.dmp

    Filesize

    1.4MB

  • memory/884-106-0x000007FEF3880000-0x000007FEF38BE000-memory.dmp

    Filesize

    248KB

  • memory/884-109-0x000007FEF2D30000-0x000007FEF2EC5000-memory.dmp

    Filesize

    1.6MB

  • memory/884-110-0x000007FEF3040000-0x000007FEF36E5000-memory.dmp

    Filesize

    6.6MB

  • memory/1644-54-0x000007FEFC331000-0x000007FEFC333000-memory.dmp

    Filesize

    8KB