Analysis
-
max time kernel
132s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
03-07-2023 18:50
Static task
static1
Behavioral task
behavioral1
Sample
T4XS.66.86.0.15.rom
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
T4XS.66.86.0.15.rom
Resource
win10v2004-20230703-en
General
-
Target
T4XS.66.86.0.15.rom
-
Size
22.1MB
-
MD5
2b243f92f93c668b136095b12c40d40e
-
SHA1
2eff966f4969ba06f236134821e46c70fadad7e8
-
SHA256
47f1c8fcd3a11775de3d3a486947d8b924ea1ab1882a1f32272b206a872a1a56
-
SHA512
b0a24f66a6b8c747ce8789bb77e87fda69ae6a4e81e628908d3c0e8bf8a976c756578952ddc3ca914771fae679006f5e9b4cf80122b6caf85fa0ce05e58ffe2a
-
SSDEEP
393216:JRdZjEzBtLh8PnA7zSFCiIxvUlBZvDTEKPI44BiNjOeL1MxwpTy1EEhYI0HTmdAK:JLmzB9Oo78tkMlBZvDTfIxMS2T9VHTm5
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000_CLASSES\.rom rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000_CLASSES\.rom\ = "rom_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000_CLASSES\rom_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000_CLASSES\rom_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000_CLASSES\rom_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000_CLASSES\rom_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000_CLASSES\rom_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000_CLASSES\rom_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 636 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 636 AcroRd32.exe 636 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2320 wrote to memory of 480 2320 cmd.exe 29 PID 2320 wrote to memory of 480 2320 cmd.exe 29 PID 2320 wrote to memory of 480 2320 cmd.exe 29 PID 480 wrote to memory of 636 480 rundll32.exe 30 PID 480 wrote to memory of 636 480 rundll32.exe 30 PID 480 wrote to memory of 636 480 rundll32.exe 30 PID 480 wrote to memory of 636 480 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\T4XS.66.86.0.15.rom1⤵
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\T4XS.66.86.0.15.rom2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:480 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\T4XS.66.86.0.15.rom"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:636
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD50a4ab1cd11ad678ef4ef81ecaf8397c8
SHA1ed2648278130d0b629b4f7e877231d8dae3829c9
SHA256e53d1035ae82d6b31abfe4cf77702d112ed5cada4ae53993fd1ce021b75e1521
SHA512b1b6140254fc405d69c4cc97287966b2ba8ec49103a0b852c4e005d542c171eaab63539022a151c358ab9b72283ed3ff4e5ad522bacb549e215a41f6169913d7