Overview
overview
5Static
static
15-3-23 0927.eml
windows7-x64
55-3-23 0927.eml
windows10-2004-x64
3attachment-2.eml
windows7-x64
5attachment-2.eml
windows10-2004-x64
3email-html-2.txt
windows7-x64
1email-html-2.txt
windows10-2004-x64
1email-plain-1.txt
windows7-x64
1email-plain-1.txt
windows10-2004-x64
1message_v4.rpmsg
windows7-x64
3message_v4.rpmsg
windows10-2004-x64
3email-plain-1.txt
windows7-x64
1email-plain-1.txt
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
04/05/2023, 14:58
Static task
static1
Behavioral task
behavioral1
Sample
5-3-23 0927.eml
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5-3-23 0927.eml
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
attachment-2.eml
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
attachment-2.eml
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
email-html-2.txt
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
email-html-2.txt
Resource
win10v2004-20230221-en
Behavioral task
behavioral7
Sample
email-plain-1.txt
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
email-plain-1.txt
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
message_v4.rpmsg
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
message_v4.rpmsg
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
email-plain-1.txt
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
email-plain-1.txt
Resource
win10v2004-20230220-en
General
-
Target
message_v4.rpmsg
-
Size
280KB
-
MD5
521ed05cacb0f90a242d3438c51dcdbf
-
SHA1
83d42fe6c2ff8fa6cb57a4b6189ca4acd23779ba
-
SHA256
f9e029d7855922179ccbaf0bd5f755ea953adde97c4bd588fef8dd349c0d57ae
-
SHA512
e66b2a3270273392aedb5cb22daedc0157dc1a85383e7a2f41cd565b71a3faecf51372be52b588c1918c23bc5a42caea5cfe612f1788b43211f14c1e2024a558
-
SSDEEP
6144:TmdWAaDOMDSkITQbtNw/N59nB8iw7gdFpahtXii+VfHNj+UAq:TqzMDSkIitSF59B8iScpaHXii+5H1
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\rpmsg_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\.rpmsg rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\.rpmsg\ = "rpmsg_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\rpmsg_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\rpmsg_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\rpmsg_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\rpmsg_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\rpmsg_auto_file\shell\Read\command rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1772 AcroRd32.exe 1772 AcroRd32.exe 1772 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1388 wrote to memory of 608 1388 cmd.exe 29 PID 1388 wrote to memory of 608 1388 cmd.exe 29 PID 1388 wrote to memory of 608 1388 cmd.exe 29 PID 608 wrote to memory of 1772 608 rundll32.exe 30 PID 608 wrote to memory of 1772 608 rundll32.exe 30 PID 608 wrote to memory of 1772 608 rundll32.exe 30 PID 608 wrote to memory of 1772 608 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\message_v4.rpmsg1⤵
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\message_v4.rpmsg2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\message_v4.rpmsg"3⤵
- Suspicious use of SetWindowsHookEx
PID:1772
-
-