Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 00:37
Static task
static1
Behavioral task
behavioral1
Sample
4f1d22f6e4f77dba87075d6d85986f58.lnk
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
4f1d22f6e4f77dba87075d6d85986f58.lnk
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
4f1d22f6e4f77dba87075d6d85986f58.lnk
-
Size
786B
-
MD5
4f1d22f6e4f77dba87075d6d85986f58
-
SHA1
e60588252910d87c27fd4d64e9c7c20fed6b72b8
-
SHA256
d37c18ce72f517f8a42f85863e97ad88e810b01db37da56e7fac777a1e524406
-
SHA512
024e8ace560400fd0642ceacb9def80ff8a4be50f9c6896ba8f8475719f2c69e176d6e2631003c686dffe67a167b2152b5532530dc0b1dc75c593aae5e3158b1
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2864 2968 cmd.exe 29 PID 2968 wrote to memory of 2864 2968 cmd.exe 29 PID 2968 wrote to memory of 2864 2968 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\4f1d22f6e4f77dba87075d6d85986f58.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c start ..\Skypee\omO.EXE explorer vzJDxzVJTUbGgaH("JUNEJQ==") & exit2⤵PID:2864
-