Analysis
-
max time kernel
107s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
14/06/2023, 13:38
Static task
static1
Behavioral task
behavioral1
Sample
file_6f5d69f2b03e447a85876c2452c2ee9c_2023-06-14_09_12_19_709000.zip
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file_6f5d69f2b03e447a85876c2452c2ee9c_2023-06-14_09_12_19_709000.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
manifest.json
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
manifest.json
Resource
win10v2004-20230221-en
General
-
Target
manifest.json
-
Size
1KB
-
MD5
563887798cc5fbfa93cda5aa6bb10f33
-
SHA1
e6c70bb4dd3b28057f5f2b7c9978f5480931afb4
-
SHA256
aeb888c05f30b6f167014c96021a74e7f4ce08a593b8dd3e3032ce4608ef37d4
-
SHA512
c23f22f2b37fd924edc36abd78a755485cbf8e0347f72c097981f0a53b6136fdd6b17d529bee7ee6d916ff06793150e95f20353aecf79bb182deb5d0ab27cbe5
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1052 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1368 wrote to memory of 1052 1368 cmd.exe 28 PID 1368 wrote to memory of 1052 1368 cmd.exe 28 PID 1368 wrote to memory of 1052 1368 cmd.exe 28
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\manifest.json1⤵
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\manifest.json2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:1052
-