Analysis

  • max time kernel
    139s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/08/2024, 20:37

General

  • Target

    MS.lnk

  • Size

    1KB

  • MD5

    698382d42978ee9b86046682cacc76ab

  • SHA1

    dd149a0c4a650df907557b3c0219fde81d339d11

  • SHA256

    e537c5da268c6a08d6e94d570e8efb17d0ca3f4013e221fadc4e0b3191499767

  • SHA512

    e02706545ef29a769c73a664380d9d86f5dc75a7c377b79aa86840270ff1b38f2d4eb24c4dd640556a2b6bf740ff28654f287932bbc66f842d76bab079d9ef46

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Binary Proxy Execution: ScriptRunner 1 TTPs 1 IoCs

    Adversaries may abuse ScriptRunner to proxy execution of malicious code.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\MS.lnk
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4076
    • C:\Windows\System32\ScriptRunner.exe
      "C:\Windows\System32\ScriptRunner.exe" -appvscript _\_\_\_\_\_\_\_\_\_\_\_\office.exe
      2⤵
      • System Binary Proxy Execution: ScriptRunner
      • Suspicious use of WriteProcessMemory
      PID:5060
      • C:\Users\Admin\AppData\Local\Temp\_\_\_\_\_\_\_\_\_\_\_\_\office.exe
        "C:\Users\Admin\AppData\Local\Temp\_\_\_\_\_\_\_\_\_\_\_\_\office.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:5068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5060-0-0x00007FFA7F9B3000-0x00007FFA7F9B5000-memory.dmp

    Filesize

    8KB

  • memory/5060-1-0x0000022C85F90000-0x0000022C85F9A000-memory.dmp

    Filesize

    40KB