Analysis

  • max time kernel
    152s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2023 17:26

General

  • Target

    TGN X V6.0.6 - Microsoft Store/TGN EXPLOIT X.pdb

  • Size

    139KB

  • MD5

    8fdaa0e0dd6c50ab9737c1365eb174d2

  • SHA1

    6e99e9698cc514017f218bea3df470bd98eba365

  • SHA256

    3605e1af22e875918d0135e61042b2713fa0492ae206cee6f29d17acdd41a03b

  • SHA512

    3de50ca187c1663ee92c20146266aaae2aff26125af48f57eb49b46bf1be9550d9c4e19c8d09e6cd44879f96a335c51d0e43d96d5e6d40f17c5d2b7b748c2acd

  • SSDEEP

    768:El+/x+/k5jDM1Zd/DeSo462F40ieY/S84ExxrgTaUrfH07YjI24qaIUecd2tci0g:cs/R4dbIYjI2xUPd2zRCmeZ/Cd2m

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\TGN X V6.0.6 - Microsoft Store\TGN EXPLOIT X.pdb"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2428
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\TGN X V6.0.6 - Microsoft Store\TGN EXPLOIT X.pdb
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2848
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\TGN X V6.0.6 - Microsoft Store\TGN EXPLOIT X.pdb"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    30f1ccd7a5701813a5041f8323cd48a9

    SHA1

    bd466b27019dcdcc4311c7f90cea00b5157e42ec

    SHA256

    c15900f11fecc69b4db292d0fa4abda891863a71b84ca49a7c386556e5ba6093

    SHA512

    cf7704ff353970c5bead26766681b1926b282a3b1a3ff5c9d6067e16a842b6dabc17c85da462d1e632e60e3f59d9a6f3fe5f8b999043ab21a5a3e3d0cae7cdc0