Analysis
-
max time kernel
149s -
max time network
79s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
07/07/2023, 05:10
Static task
static1
Behavioral task
behavioral1
Sample
app-release.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
app-release.apk
Resource
android-x64-20230621-en
Behavioral task
behavioral3
Sample
app-release.apk
Resource
android-x64-arm64-20230621-en
Behavioral task
behavioral4
Sample
baseline.prof
Resource
win7-20230703-en
Behavioral task
behavioral5
Sample
baseline.prof
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
baseline.profm
Resource
win7-20230703-en
Behavioral task
behavioral7
Sample
baseline.profm
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
kawaii
Resource
win7-20230703-en
Behavioral task
behavioral9
Sample
kawaii
Resource
win10v2004-20230703-en
General
-
Target
baseline.profm
-
Size
658B
-
MD5
2ad9000f004a5f56cd18235358419fb9
-
SHA1
1244aebe603e36192ea5cf16f39a9b1659b1bb33
-
SHA256
253c1652ad08e10c02bf5f0b76ae366a80e56b4d457b775a15c9757cef8e8eca
-
SHA512
a7a323ae9c1f2a451331a73cadbc5d9b2e31e234b5ae083e466f0fdaee46fcd14ac16fed798a752b5275bc976fa08c92407653d39d03dc72be8a816aaa5b2add
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000_CLASSES\profm_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000_CLASSES\profm_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000_CLASSES\profm_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000_CLASSES\profm_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000_CLASSES\.profm rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000_CLASSES\.profm\ = "profm_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000_CLASSES\profm_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000_CLASSES\profm_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 820 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 820 AcroRd32.exe 820 AcroRd32.exe 820 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2932 2028 cmd.exe 30 PID 2028 wrote to memory of 2932 2028 cmd.exe 30 PID 2028 wrote to memory of 2932 2028 cmd.exe 30 PID 2932 wrote to memory of 820 2932 rundll32.exe 31 PID 2932 wrote to memory of 820 2932 rundll32.exe 31 PID 2932 wrote to memory of 820 2932 rundll32.exe 31 PID 2932 wrote to memory of 820 2932 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\baseline.profm1⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\baseline.profm2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\baseline.profm"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:820
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5426e10bc93422bf44293dd519c084f96
SHA119f633bee260bbcf0b58a22582266c09432efead
SHA256d40dcb741011455f7c5099b8b6bfb11618d246d27492a71fbed572f7a4d746cc
SHA512a3a3f2c157a54b8098c50d95668d454eacf384d0927725b3adbf0b774918975b9e27b3cdd099feab43b7e8f8df90d8ea3e3b802b7009c861b26def45a6439134