Analysis
-
max time kernel
138s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 09:17
Behavioral task
behavioral1
Sample
documents.lnk
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
documents.lnk
Resource
win10v2004-20240226-en
windows10-2004-x64
3 signatures
150 seconds
Behavioral task
behavioral3
Sample
sysmon32.exe
Resource
win7-20240221-en
windows7-x64
0 signatures
150 seconds
Behavioral task
behavioral4
Sample
sysmon32.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
0 signatures
150 seconds
General
-
Target
documents.lnk
-
Size
1KB
-
MD5
feab777f81627e16c143ead0f3bdc780
-
SHA1
d149bd28ada295b34d10d9c363cfaed604691e68
-
SHA256
170d68f8e0b1149374c5d6de3e4da3b06e572e630c4f634f99eee30331e4fff9
-
SHA512
550e52a4b605b0177a7c0c971823c75ad2946e610b2babf5b4b50e16ef377361f479abe73c6986322142841d578a636e6789f671644ced569930c9c921968eec
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2560 2204 cmd.exe 29 PID 2204 wrote to memory of 2560 2204 cmd.exe 29 PID 2204 wrote to memory of 2560 2204 cmd.exe 29 PID 2560 wrote to memory of 2544 2560 rundll32.exe 30 PID 2560 wrote to memory of 2544 2560 rundll32.exe 30 PID 2560 wrote to memory of 2544 2560 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\documents.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" advpack.dll,RegisterOCX sysmon32.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\sysmon32.exesysmon32.exe /RegServer3⤵PID:2544
-
-