Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 11:12
Static task
static1
Behavioral task
behavioral1
Sample
bb1ee51e8f2046e743bee7692cbba986.lnk
Resource
win7-20240220-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
bb1ee51e8f2046e743bee7692cbba986.lnk
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
bb1ee51e8f2046e743bee7692cbba986.lnk
-
Size
801B
-
MD5
bb1ee51e8f2046e743bee7692cbba986
-
SHA1
55e9beffc97c9f91c380f499c6c3e298c16fc043
-
SHA256
d634e603889a39b57adb26b43ea318e35f35a7cf4cba8d1d2bf6ba8d769ab927
-
SHA512
71233d00028ce0a55413366fe06b87c6c8d174b788d4d091b9fc2d5b986985c6f5db68f7190284ebb4589db2f949b2c3b5c3dc0214c5eb6bcb3d0d5aee5bd733
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 3480 svchost.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\bb1ee51e8f2046e743bee7692cbba986.lnk1⤵PID:224
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3532
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3480