Analysis
-
max time kernel
140s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 13:52
Static task
static1
Behavioral task
behavioral1
Sample
7392552d6037a56697f5b988bdc40f3f.lnk
Resource
win7-20231129-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
7392552d6037a56697f5b988bdc40f3f.lnk
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
7392552d6037a56697f5b988bdc40f3f.lnk
-
Size
1KB
-
MD5
7392552d6037a56697f5b988bdc40f3f
-
SHA1
3920344c308e9f0d7925e48e8b5661c94a369528
-
SHA256
6d15220bd44839e52e58d61b8c4eb1f2fa378b5787ccae959a71f50898d44912
-
SHA512
0356eed708c185214b32f21b50917f2a39df2626cee7824b4b9f5e433ff685d61cf9975ae4e41aa5808227ff1723e6825960cc67914fb37e386d2ce6df8d4a36
Score
7/10
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 908 wrote to memory of 2656 908 cmd.exe 88 PID 908 wrote to memory of 2656 908 cmd.exe 88 PID 2656 wrote to memory of 2144 2656 cmd.exe 91 PID 2656 wrote to memory of 2144 2656 cmd.exe 91 PID 2656 wrote to memory of 2060 2656 cmd.exe 92 PID 2656 wrote to memory of 2060 2656 cmd.exe 92
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\7392552d6037a56697f5b988bdc40f3f.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c set zz=Files.bat& cmd.exe /c %zz% > nul& cd Files& cmd.exe /c "MyIcon.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\system32\cmd.execmd.exe /c %zz%3⤵PID:2144
-
-
C:\Windows\system32\cmd.execmd.exe /c "MyIcon.exe"3⤵PID:2060
-
-