Analysis
-
max time kernel
121s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 22:27
Static task
static1
Behavioral task
behavioral1
Sample
b564b2c1e682db9c8683a83d3330e7f03e8ad9c2b76379d6f7dada987ebcd714_JC.lnk
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b564b2c1e682db9c8683a83d3330e7f03e8ad9c2b76379d6f7dada987ebcd714_JC.lnk
Resource
win10v2004-20230915-en
General
-
Target
b564b2c1e682db9c8683a83d3330e7f03e8ad9c2b76379d6f7dada987ebcd714_JC.lnk
-
Size
2KB
-
MD5
320adae62315731cb146c3e7fce6b9be
-
SHA1
c105b7f1b1e8c19fe0adac5d366edce8becd1267
-
SHA256
b564b2c1e682db9c8683a83d3330e7f03e8ad9c2b76379d6f7dada987ebcd714
-
SHA512
a36d54f43398fe7fca759e79b9918de936b2355a8d4071ef2e60a436096213e365d2e9789034aceb7255d5e29d437b39c7f76580e2194aaa56cd89ac5f17ba85
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2624 wrote to memory of 1652 2624 cmd.exe 31 PID 2624 wrote to memory of 1652 2624 cmd.exe 31 PID 2624 wrote to memory of 1652 2624 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\b564b2c1e682db9c8683a83d3330e7f03e8ad9c2b76379d6f7dada987ebcd714_JC.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c other\\4a\\cleaner.bat2⤵PID:1652
-