Analysis
-
max time kernel
140s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 09:56
Behavioral task
behavioral1
Sample
documents.lnk
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
documents.lnk
Resource
win10v2004-20240226-en
windows10-2004-x64
3 signatures
150 seconds
Behavioral task
behavioral3
Sample
sysmon64.exe
Resource
win7-20240221-en
windows7-x64
0 signatures
150 seconds
Behavioral task
behavioral4
Sample
sysmon64.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
0 signatures
150 seconds
General
-
Target
documents.lnk
-
Size
1KB
-
MD5
813dd41c91bb43332482ad5c0857a8d7
-
SHA1
5dfa29b64941d86e05be9d99b881dec1fb8338f4
-
SHA256
b953d0b1efb9719f79954788480235b8eccb84b13c5d373969fa3a03aabef788
-
SHA512
72536d2787db0cef94aab6088865b5ddaf351330306ba860179a7dbe7a70ca9d6e9d8e88821e4078cbe9ad3e736c758f26758cf7e8a9df7dc12d76df6b124058
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1008 wrote to memory of 2396 1008 cmd.exe 29 PID 1008 wrote to memory of 2396 1008 cmd.exe 29 PID 1008 wrote to memory of 2396 1008 cmd.exe 29 PID 2396 wrote to memory of 2892 2396 rundll32.exe 30 PID 2396 wrote to memory of 2892 2396 rundll32.exe 30 PID 2396 wrote to memory of 2892 2396 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\documents.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" advpack.dll,RegisterOCX sysmon64.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\sysmon64.exesysmon64.exe /RegServer3⤵PID:2892
-
-