Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    14-09-2023 08:36

General

  • Target

    fncfxb.au3.malware

  • Size

    760KB

  • MD5

    548b423833439879e2ef091a3b38fdd7

  • SHA1

    fc7abba81f21bb68653983ce6770e3e3156ee62e

  • SHA256

    bd8fc787abfebba8d167e9979c2ec692f861ab21ea138c3381daa852a58677be

  • SHA512

    183df28fddd70493fb56f4654f1af30f0e046f8f04ec6aa40e8115ed2cabe1b7f1b71a9b4fe52d80f93cc30271f54c5f365b512d33b91f4ba79b3da20e541795

  • SSDEEP

    12288:0GPp9+e8zj98hVcp64FV42p5ot4k6on9Nkt22oV64P3FmMmVxcxlMY1D:0GPplGp64FLSitoi22oV6w3FmMSxWl7J

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\fncfxb.au3.malware
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1252
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\fncfxb.au3.malware
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2836
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\fncfxb.au3.malware"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2600

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    e9736d9f43a4a5420d90fd22e744f263

    SHA1

    4d41ffaa41004f08c66c7ba859fb035e7aca65ae

    SHA256

    8feb3e6bbe9b815b81770b35c763015ff44dd702d6b146b411781c3e7e69af0a

    SHA512

    5b4e644a3758815e45143fbfb13093f76647b48f7f35ee21712325521d7a904acd6314a99bf99c194a031df074fc5f7adc08fb1a8b7f60ed00b1242514b81067