Analysis
-
max time kernel
150s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
29/05/2023, 19:45
Static task
static1
Behavioral task
behavioral1
Sample
portada-libro-blanco-aislado.zip
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
portada-libro-blanco-aislado.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Isolated_white_book_cover.jpg
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
Isolated_white_book_cover.jpg
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
Isolated_white_book_cover.psd
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
Isolated_white_book_cover.psd
Resource
win10v2004-20230220-en
General
-
Target
Isolated_white_book_cover.psd
-
Size
9.3MB
-
MD5
cc236c0049c6c9e102bb0f22e82cb0ee
-
SHA1
4858b8cb4aa4495a3519c1f8a2eb7dbee02d0fec
-
SHA256
b1b1334c72f8ada8e10e675f0fdb6f0732275fe461770f2a34b301668cafff44
-
SHA512
a562e7b5f522d5ee20f4f5cbce3fd91552c8a0b304d44443d92644a3ef88e25ff9a8dc3caa8a75201b7e7a81779fcd7310d9b63c18e429076322480e540b4ef9
-
SSDEEP
196608:EInw0SbJURbyi+Td7a8JCDSOxnXOHaLwZc:EIw0SFURe7Td7a8JCDSOxnX6aLwZc
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\psd_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\.psd\ = "psd_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\psd_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\psd_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\.psd rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\psd_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\psd_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\psd_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1712 AcroRd32.exe 1712 AcroRd32.exe 1712 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1276 wrote to memory of 1732 1276 cmd.exe 28 PID 1276 wrote to memory of 1732 1276 cmd.exe 28 PID 1276 wrote to memory of 1732 1276 cmd.exe 28 PID 1732 wrote to memory of 1712 1732 rundll32.exe 29 PID 1732 wrote to memory of 1712 1732 rundll32.exe 29 PID 1732 wrote to memory of 1712 1732 rundll32.exe 29 PID 1732 wrote to memory of 1712 1732 rundll32.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Isolated_white_book_cover.psd1⤵
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Isolated_white_book_cover.psd2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Isolated_white_book_cover.psd"3⤵
- Suspicious use of SetWindowsHookEx
PID:1712
-
-