Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
03/10/2023, 08:44
Static task
static1
Behavioral task
behavioral1
Sample
smart_Irrigation_System.ino
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
smart_Irrigation_System.ino
Resource
win10v2004-20230915-en
General
-
Target
smart_Irrigation_System.ino
-
Size
1KB
-
MD5
6756df1c5ee4b3bafd3cc78bc7817073
-
SHA1
b4c03f123a89d9114f0b736de115b1f277deeae3
-
SHA256
b20d94ad66c3fefa0fd803c733070f7281931489b090602cbc9b11f9e8e751a1
-
SHA512
270c96976459cd634c4fdc059062ed435e53ea2685b5354e6ed7c06d80ccd173aaa4a3fc3d8459b1c2e74e49c3249c3c6ec3729c0f2569d6a1fac2f43354479c
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\ino_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\.ino\ = "ino_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\ino_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\ino_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\ino_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\ino_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\.ino rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\ino_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2636 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2636 AcroRd32.exe 2636 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2700 2192 cmd.exe 29 PID 2192 wrote to memory of 2700 2192 cmd.exe 29 PID 2192 wrote to memory of 2700 2192 cmd.exe 29 PID 2700 wrote to memory of 2636 2700 rundll32.exe 30 PID 2700 wrote to memory of 2636 2700 rundll32.exe 30 PID 2700 wrote to memory of 2636 2700 rundll32.exe 30 PID 2700 wrote to memory of 2636 2700 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\smart_Irrigation_System.ino1⤵
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\smart_Irrigation_System.ino2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\smart_Irrigation_System.ino"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2636
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD59263ec81baea46e8b31641dba6d7634d
SHA137c679512537b4b518cbe28c68e30c60f496931a
SHA256d92c088fb9cda6f51a7056e348381dda2b3aed8a10322cddeb88dcd0adf44829
SHA512adc7745fdfb65e34b18c5e0ceb86c4c1e4b4b58e110ac9e887accf4a7a282d59e4adac6854c506a4666b965147b2781f044f746ef85738d41e74b63089b482d0