Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 19:35
Static task
static1
Behavioral task
behavioral1
Sample
92ef05ccb23abcf984ca7b4138b82453660eec408cad4eb744883bbff559b6c1.lnk
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
92ef05ccb23abcf984ca7b4138b82453660eec408cad4eb744883bbff559b6c1.lnk
Resource
win10v2004-20241007-en
General
-
Target
92ef05ccb23abcf984ca7b4138b82453660eec408cad4eb744883bbff559b6c1.lnk
-
Size
4KB
-
MD5
4cfbbb0ddf8a53b3dcf094db5be6cbf0
-
SHA1
00da5af0de657b8925a34c01c37af2ea4972492f
-
SHA256
92ef05ccb23abcf984ca7b4138b82453660eec408cad4eb744883bbff559b6c1
-
SHA512
c70ac72907f0059116cfafa28cf2db3150ae96cc81260c77ff060d47138976dedca3ec925076ae6b6a2f49ee6858f346f180cee6a305bf1d99abb2f6da5fe4d2
-
SSDEEP
96:8mj6t04O4Zi+CQ++ZBVi8oAARa9qyaGZC6NnLzVjjLdH:8m+tq4k+++ZK8EGZC6dLzVjfdH
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2696 2848 cmd.exe 32 PID 2848 wrote to memory of 2696 2848 cmd.exe 32 PID 2848 wrote to memory of 2696 2848 cmd.exe 32 PID 2696 wrote to memory of 2832 2696 cmd.exe 33 PID 2696 wrote to memory of 2832 2696 cmd.exe 33 PID 2696 wrote to memory of 2832 2696 cmd.exe 33 PID 2696 wrote to memory of 2576 2696 cmd.exe 34 PID 2696 wrote to memory of 2576 2696 cmd.exe 34 PID 2696 wrote to memory of 2576 2696 cmd.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\92ef05ccb23abcf984ca7b4138b82453660eec408cad4eb744883bbff559b6c1.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /v:on /c findstr "glKmfOKnQLYKnNs.*" "Archivo_2504.lnk" > "C:\Users\Admin\AppData\Local\Temp\YlScZcZKeP.vbs" & "C:\Users\Admin\AppData\Local\Temp\YlScZcZKeP.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\system32\findstr.exefindstr "glKmfOKnQLYKnNs.*" "Archivo_2504.lnk"3⤵PID:2832
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\YlScZcZKeP.vbs"3⤵PID:2576
-
-