Analysis
-
max time kernel
149s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
26/04/2023, 09:22
Static task
static1
Behavioral task
behavioral1
Sample
0x000600000001aed7-221.dat
Resource
win7-20230220-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
0x000600000001aed7-221.dat
Resource
win10v2004-20230220-en
3 signatures
150 seconds
General
-
Target
0x000600000001aed7-221.dat
-
Size
3KB
-
MD5
2e33475a88e04e3730f8f4071999d4bd
-
SHA1
0927e48d079f53f2918f0da295815aa30fd9e332
-
SHA256
b02a228ef21dfbb2c2f9a26dfc6c1259d39b67ccf551ab274e3023f2798736a4
-
SHA512
4c4e4239ee2a497ffade47d07df63cb01d2516427c430c05206c51755cd3c3645ebaa118805efd381f049f2e35593897c8ea0f9a0a009eb7e2ff62f63953342c
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\dat_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\dat_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\.dat rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\.dat\ = "dat_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\dat_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\dat_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\dat_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\dat_auto_file\shell rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1448 AcroRd32.exe 1448 AcroRd32.exe 1448 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2016 wrote to memory of 520 2016 cmd.exe 29 PID 2016 wrote to memory of 520 2016 cmd.exe 29 PID 2016 wrote to memory of 520 2016 cmd.exe 29 PID 520 wrote to memory of 1448 520 rundll32.exe 30 PID 520 wrote to memory of 1448 520 rundll32.exe 30 PID 520 wrote to memory of 1448 520 rundll32.exe 30 PID 520 wrote to memory of 1448 520 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\0x000600000001aed7-221.dat1⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\0x000600000001aed7-221.dat2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\0x000600000001aed7-221.dat"3⤵
- Suspicious use of SetWindowsHookEx
PID:1448
-
-