Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 13:24
Static task
static1
Behavioral task
behavioral1
Sample
11a16f65bc93892eb674e05389f126eb10b8f5502998aa24b5c1984b415f9d18.lnk
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
11a16f65bc93892eb674e05389f126eb10b8f5502998aa24b5c1984b415f9d18.lnk
Resource
win10v2004-20241007-en
General
-
Target
11a16f65bc93892eb674e05389f126eb10b8f5502998aa24b5c1984b415f9d18.lnk
-
Size
292.5MB
-
MD5
725f2f61dadde4dd4ea0c4ad8666cd2a
-
SHA1
5b87ffd40088e98e37d889ed0ca08ff237440a1b
-
SHA256
11a16f65bc93892eb674e05389f126eb10b8f5502998aa24b5c1984b415f9d18
-
SHA512
611d66b543d7a86b98778b99db429b3998afa9f4b0a7b744f5ec1fb3e3180653fe13e0ef6f8d75e09e7309f6aac0a9aa76a6c27486b0ad836fd98e24c5b5e977
-
SSDEEP
12288:4kz23N5x1aD1vsNcccVFpZxhASzeql05TjeKR3ePe/:/65x1aRi3CfPvl0FjeHm/
Malware Config
Signatures
-
pid Process 1988 certutil.exe 1048 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2488 wrote to memory of 1048 2488 cmd.exe 31 PID 2488 wrote to memory of 1048 2488 cmd.exe 31 PID 2488 wrote to memory of 1048 2488 cmd.exe 31 PID 1048 wrote to memory of 1988 1048 cmd.exe 32 PID 1048 wrote to memory of 1988 1048 cmd.exe 32 PID 1048 wrote to memory of 1988 1048 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\11a16f65bc93892eb674e05389f126eb10b8f5502998aa24b5c1984b415f9d18.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c if exist C:\Users\Admin\AppData\Local\Temp\temp1_CC3USWBBB.zip\CCBBB3US-W7YTK.pdf..lnk (certutil.exe -decode C:\Users\Admin\AppData\Local\Temp\temp1_CC3USWBBB.zip\CCBBB3US-W7YTK.pdf..lnk C:\Users\Admin\AppData\Local\Temp\.hta&start C:\Users\Admin\AppData\Local\Temp\.hta)else (certutil -decode CCBBB3US-W7YTK.pdf..lnk C:\Users\Admin\AppData\Local\Temp\.hta&start C:\Users\Admin\AppData\Local\Temp\.hta)2⤵
- Deobfuscate/Decode Files or Information
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\system32\certutil.execertutil -decode CCBBB3US-W7YTK.pdf..lnk C:\Users\Admin\AppData\Local\Temp\.hta3⤵
- Deobfuscate/Decode Files or Information
PID:1988
-
-