Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
14-01-2024 18:52
Static task
static1
Behavioral task
behavioral1
Sample
5b98a4f12657b97cc61dbcbb9cebcf96.lnk
Resource
win7-20231215-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
5b98a4f12657b97cc61dbcbb9cebcf96.lnk
Resource
win10v2004-20231222-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
5b98a4f12657b97cc61dbcbb9cebcf96.lnk
-
Size
1KB
-
MD5
5b98a4f12657b97cc61dbcbb9cebcf96
-
SHA1
95ea851554758f70b2c14873e460c695eb3bf72f
-
SHA256
077e8f3f62ec512212e6b4fe10057de23d19af917668350eebd5c6ed31591fe1
-
SHA512
11cc8da3c0b8966a0535327e5f9b04b60302fe006c4474bca133eb5642844c00eb494d6b51fe9e723b80762c02fc4b3ada316c2482f6ee35e26708ef466d5010
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 3976 svchost.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\5b98a4f12657b97cc61dbcbb9cebcf96.lnk1⤵PID:1852
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3800
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3976