Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
18-09-2023 13:43
Static task
static1
Behavioral task
behavioral1
Sample
PersonalMessenger.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
PersonalMessenger.apk
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral3
Sample
baseline.prof
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
baseline.prof
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
baseline.profm
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
baseline.profm
Resource
win10v2004-20230915-en
General
-
Target
baseline.profm
-
Size
205B
-
MD5
ed4a7b465662696bb4900080487207b3
-
SHA1
c616d6039a986fe844d177dcd67bdb703fd98676
-
SHA256
a2c93b02e8b9d2373ce7ff4a1054c7dc5a2d617a88bd07bd538f47de2d8b9f8e
-
SHA512
3df0abacd679a44374780cf7c174544359fea584186a784e6a898be1f28a3e18415c22ff0d09f973f518093ba7f0fd68c9417a5f61314f75ca87353fc9c0f7ca
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\profm_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\.profm\ = "profm_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\profm_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\profm_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\profm_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\.profm rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\profm_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\profm_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2140 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2140 AcroRd32.exe 2140 AcroRd32.exe 2140 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2704 2016 cmd.exe 29 PID 2016 wrote to memory of 2704 2016 cmd.exe 29 PID 2016 wrote to memory of 2704 2016 cmd.exe 29 PID 2704 wrote to memory of 2140 2704 rundll32.exe 30 PID 2704 wrote to memory of 2140 2704 rundll32.exe 30 PID 2704 wrote to memory of 2140 2704 rundll32.exe 30 PID 2704 wrote to memory of 2140 2704 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\baseline.profm1⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\baseline.profm2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\baseline.profm"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2140
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD56178839bc46b76d0ba4ce4a5e21a4a7d
SHA1722eed1215e2b083ff1f91db0c286eba85c48066
SHA2560963cb157b73c7f2deeddf425e0ff67cd0d2f7121d0cdd1fe67fcfda9c786f43
SHA512e302f982832e8f24a3a8da079def819cafbbc8b93f378b43ba60bbc4933eaa5e505099b690657d7eada9d5d41f0e993eeea2399330db0de149bbbd86bd737e6c