General
-
Target
https://www.bing.com/ck/a?!&&p=dc2750039c3e05eaJmltdHM9MTcyMDQ4MzIwMCZpZ3VpZD0xZmMyN2IzOC1jNTQyLTY0NmUtMTQ2MC02ZjU0YzQ2YTY1YWEmaW5zaWQ9NTIxNg&ptn=3&ver=2&hsh=3&fclid=1fc27b38-c542-646e-1460-6f54c46a65aa&psq=download+opera+gx&u=a1aHR0cHM6Ly93d3cub3BlcmEuY29tL2d4P21zb2NraWQ9MWZjMjdiMzhjNTQyNjQ2ZTE0NjA2ZjU0YzQ2YTY1YWE&ntb=1
-
Sample
240709-npafgssark
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.bing.com/ck/a?!&&p=dc2750039c3e05eaJmltdHM9MTcyMDQ4MzIwMCZpZ3VpZD0xZmMyN2IzOC1jNTQyLTY0NmUtMTQ2MC02ZjU0YzQ2YTY1YWEmaW5zaWQ9NTIxNg&ptn=3&ver=2&hsh=3&fclid=1fc27b38-c542-646e-1460-6f54c46a65aa&psq=download+opera+gx&u=a1aHR0cHM6Ly93d3cub3BlcmEuY29tL2d4P21zb2NraWQ9MWZjMjdiMzhjNTQyNjQ2ZTE0NjA2ZjU0YzQ2YTY1YWE&ntb=1
Resource
win10v2004-20240704-en
Malware Config
Targets
-
-
Target
https://www.bing.com/ck/a?!&&p=dc2750039c3e05eaJmltdHM9MTcyMDQ4MzIwMCZpZ3VpZD0xZmMyN2IzOC1jNTQyLTY0NmUtMTQ2MC02ZjU0YzQ2YTY1YWEmaW5zaWQ9NTIxNg&ptn=3&ver=2&hsh=3&fclid=1fc27b38-c542-646e-1460-6f54c46a65aa&psq=download+opera+gx&u=a1aHR0cHM6Ly93d3cub3BlcmEuY29tL2d4P21zb2NraWQ9MWZjMjdiMzhjNTQyNjQ2ZTE0NjA2ZjU0YzQ2YTY1YWE&ntb=1
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-