Analysis

  • max time kernel
    147s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/03/2024, 11:58

General

  • Target

    FAQ.pdf.lnk

  • Size

    775B

  • MD5

    8b467c84552de869cae28b5e992a37f8

  • SHA1

    002eb0b026bfe352ce305ec2ec56779739e47197

  • SHA256

    1911ff41187a4bcf07b5ff96b50bd2ab213a8253fde6c76480f4ef7d4044e0ff

  • SHA512

    41c7b15935da0776bc8c2472dd02ec3870833cec175017d3711c1b8d6d16ac45f435ecfb87d7850ad674bd2b7b517cd66ce5c06b94b02f3244b4349c3b5397ca

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\FAQ.pdf.lnk
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1804
    • C:\Windows\System32\conhost.exe
      "C:\Windows\System32\conhost.exe" cmd /c "(xcopy . C:\Users\Admin\AppData\Roaming\Graphic\ /H /I /Y & C:\Users\Admin\AppData\Roaming\Graphic\Graphic Local)"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2116
      • C:\Windows\System32\cmd.exe
        cmd /c "(xcopy . C:\Users\Admin\AppData\Roaming\Graphic\ /H /I /Y & C:\Users\Admin\AppData\Roaming\Graphic\Graphic Local)"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2684
        • C:\Windows\system32\xcopy.exe
          xcopy . C:\Users\Admin\AppData\Roaming\Graphic\ /H /I /Y
          4⤵
            PID:1404

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Graphic\wct63AB.tmp

            Filesize

            63KB

            MD5

            e516a60bc980095e8d156b1a99ab5eee

            SHA1

            238e243ffc12d4e012fd020c9822703109b987f6

            SHA256

            543796a1b343b4ebc0285d89cb8eb70667ac7b513da37495e38003704e9d88d7

            SHA512

            9b51e99ba20e9da56d1acc24a1cf9f9c9dbdeb742bec034e0ff2bc179a60f4aff249f40344f9ddd43229dcdefa1041940f65afb336d46c175ffeff725c638d58