Analysis

  • max time kernel
    146s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 08:31

General

  • Target

    137a5325ee6f4b5c7463ffad88ce21d6.lnk

  • Size

    911B

  • MD5

    137a5325ee6f4b5c7463ffad88ce21d6

  • SHA1

    45d7a0dbd5a2b21adfe6610012831258abb65056

  • SHA256

    06bc3b1e8c4a7f0b8b6ea744c47a10477e160739383c0022a3ddbb5b63eaf884

  • SHA512

    58482bbd0ac20ca0b6343436ab5ede23a5cdb0c2d802d5e44340559691c9d8b366a806c71d2f4140706c7695f95fe912aa204ae81326a4ab23122be14e8cb76d

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\137a5325ee6f4b5c7463ffad88ce21d6.lnk
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:3356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads