Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14-09-2023 08:36
Static task
static1
Behavioral task
behavioral1
Sample
Stage 2 Malware.zip
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Stage 2 Malware.zip
Resource
win10v2004-20230831-en
Behavioral task
behavioral3
Sample
Autoit3.exe
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
Autoit3.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral5
Sample
fncfxb.au3.malware
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
fncfxb.au3.malware
Resource
win10v2004-20230831-en
General
-
Target
fncfxb.au3.malware
-
Size
760KB
-
MD5
548b423833439879e2ef091a3b38fdd7
-
SHA1
fc7abba81f21bb68653983ce6770e3e3156ee62e
-
SHA256
bd8fc787abfebba8d167e9979c2ec692f861ab21ea138c3381daa852a58677be
-
SHA512
183df28fddd70493fb56f4654f1af30f0e046f8f04ec6aa40e8115ed2cabe1b7f1b71a9b4fe52d80f93cc30271f54c5f365b512d33b91f4ba79b3da20e541795
-
SSDEEP
12288:0GPp9+e8zj98hVcp64FV42p5ot4k6on9Nkt22oV64P3FmMmVxcxlMY1D:0GPplGp64FLSitoi22oV6w3FmMSxWl7J
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\malware_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\malware_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\malware_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\malware_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\malware_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\.malware rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\.malware\ = "malware_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\malware_auto_file\shell\Read rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2600 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2600 AcroRd32.exe 2600 AcroRd32.exe 2600 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1252 wrote to memory of 2836 1252 cmd.exe 29 PID 1252 wrote to memory of 2836 1252 cmd.exe 29 PID 1252 wrote to memory of 2836 1252 cmd.exe 29 PID 2836 wrote to memory of 2600 2836 rundll32.exe 30 PID 2836 wrote to memory of 2600 2836 rundll32.exe 30 PID 2836 wrote to memory of 2600 2836 rundll32.exe 30 PID 2836 wrote to memory of 2600 2836 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\fncfxb.au3.malware1⤵
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\fncfxb.au3.malware2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\fncfxb.au3.malware"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2600
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e9736d9f43a4a5420d90fd22e744f263
SHA14d41ffaa41004f08c66c7ba859fb035e7aca65ae
SHA2568feb3e6bbe9b815b81770b35c763015ff44dd702d6b146b411781c3e7e69af0a
SHA5125b4e644a3758815e45143fbfb13093f76647b48f7f35ee21712325521d7a904acd6314a99bf99c194a031df074fc5f7adc08fb1a8b7f60ed00b1242514b81067