Resubmissions

01/06/2023, 09:37

230601-llly1ade57 3

01/06/2023, 09:29

230601-lgdrtsdh8z 3

01/06/2023, 09:12

230601-k59czadh41 1

Analysis

  • max time kernel
    149s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01/06/2023, 09:29

General

  • Target

    manifest.json

  • Size

    171B

  • MD5

    abaff3a8b9e0206db0b4aff1a9b53591

  • SHA1

    e41769b3a2e666d104024653f7992e73ac78f81e

  • SHA256

    23c38647b3081a4b9b4d010ec6ecaf90ca4bd37ae4581d0dbb7ec6a49c5ddd69

  • SHA512

    aa09a468b9f4d33d1586a6da2e337f12e4d78d4498a5d7649937cf4d4e91e68a5733d069f3a8e363a23131067bb56b4fa94ae048b5cf90d6481815940cb376ce

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\manifest.json
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\manifest.json
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:672
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\manifest.json"
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:1688

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads