Analysis
-
max time kernel
149s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
08-05-2023 13:17
Behavioral task
behavioral1
Sample
Bouwvak 2023.xlsx.attack1
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Bouwvak 2023.xlsx.attack1
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
How_to_back_files.html
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
How_to_back_files.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
WEEKPLANNING 2023.docx.attack1
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
WEEKPLANNING 2023.docx.attack1
Resource
win10v2004-20230220-en
General
-
Target
WEEKPLANNING 2023.docx.attack1
-
Size
220KB
-
MD5
5375570516b3f895a0cc78b92ddbaeb2
-
SHA1
fe9434598a2555f7595f97ab8b590033b12a5b25
-
SHA256
85043ed6006aeeb9b374300c0e997c913579002f2fe1ff3c648216e3576d4ae6
-
SHA512
3d5a73635d71a9b7505aed93cc2d758d99b2911cd2ff4fa108d24f35b44cbcfbdbc4d6a88afec12c707a36ec2b2c4b0c974aedfd0d1ad0eef0a5c4acc10c59b1
-
SSDEEP
6144:t5apOabqGYWvYp1Nq11bRbItI19yrb/1WpgDo2g:tEpgHW11Krj1WpSo2g
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\attack1_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\attack1_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\attack1_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\attack1_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\attack1_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\.attack1\ = "attack1_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\attack1_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\.attack1 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
AcroRd32.exepid process 892 AcroRd32.exe 892 AcroRd32.exe 892 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 1684 wrote to memory of 568 1684 cmd.exe rundll32.exe PID 1684 wrote to memory of 568 1684 cmd.exe rundll32.exe PID 1684 wrote to memory of 568 1684 cmd.exe rundll32.exe PID 568 wrote to memory of 892 568 rundll32.exe AcroRd32.exe PID 568 wrote to memory of 892 568 rundll32.exe AcroRd32.exe PID 568 wrote to memory of 892 568 rundll32.exe AcroRd32.exe PID 568 wrote to memory of 892 568 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\WEEKPLANNING 2023.docx.attack1"1⤵
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\WEEKPLANNING 2023.docx.attack12⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\WEEKPLANNING 2023.docx.attack1"3⤵
- Suspicious use of SetWindowsHookEx
PID:892
-
-