Analysis

  • max time kernel
    151s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    26-08-2023 22:06

General

  • Target

    com/google/android/gms/measurement/internal/AppMeasurementDynamiteService$zzb.class

  • Size

    1KB

  • MD5

    f5604278b0d7aeba5aba3c413663623a

  • SHA1

    f1c4fb18990204272b9ac5e75ec5b9a337740192

  • SHA256

    80bb1e79213073bbba15a967ab15659d2e7c7699326937370e6f61b692d04d7a

  • SHA512

    d84b146833bb4527416f9d3ec439bb1c8d3f4a946b9325f58e0126580dfe17b4c336ed5d96db7f0724076b7a19a4267bbfcb253dcc5f8dff4decceca068f5746

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\com\google\android\gms\measurement\internal\AppMeasurementDynamiteService$zzb.class
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1784
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\com\google\android\gms\measurement\internal\AppMeasurementDynamiteService$zzb.class
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1476
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\com\google\android\gms\measurement\internal\AppMeasurementDynamiteService$zzb.class"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2468

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    2421595288217d0e4ad390394c5fe6bb

    SHA1

    496c7e3954b3bf74dd6e2385f9ccab0dbdad334d

    SHA256

    72f067a2952ade03d6a985501893e0e30d47d9b223662e1f91bdd54a9e7da42b

    SHA512

    cb32ae0457b7d40fc69af8a8f1b9db7116a39a13ed7b8ef06f46e6911fb1123f8e2932aaba1b16a024a2fc3eb7146dabb58c2259d506fee9e35647892cf7aab0