Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
21-10-2023 08:07
Static task
static1
Behavioral task
behavioral1
Sample
yuzu-20231021-8a4433c0b.apk
Resource
android-x64-arm64-20231020-en
Behavioral task
behavioral2
Sample
baseline.prof
Resource
win7-20231020-en
Behavioral task
behavioral3
Sample
baseline.prof
Resource
win10v2004-20231020-en
Behavioral task
behavioral4
Sample
baseline.profm
Resource
win7-20231020-en
Behavioral task
behavioral5
Sample
baseline.profm
Resource
win10v2004-20231020-en
General
-
Target
baseline.prof
-
Size
3KB
-
MD5
f3628eb1abcdd938078d97922e53dca5
-
SHA1
8fd71a68f2acedf34468a82f18384657d0f9089b
-
SHA256
ff2d733a3fe3ffb8f837baafc7fadf3352abc8dc841b496287d86627bb3e432c
-
SHA512
215cb6c3df2de38badefd100333698c9f6bb6f24b841e6f9c8439c270fc4cc118a3958c166cefc992cb5ad154dc11c88d80da23c5236f0f03f740f9281550861
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000_CLASSES\prof_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000_CLASSES\prof_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000_CLASSES\prof_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000_CLASSES\.prof rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000_CLASSES\.prof\ = "prof_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000_CLASSES\prof_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000_CLASSES\prof_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000_CLASSES\prof_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3004 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3004 AcroRd32.exe 3004 AcroRd32.exe 3004 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2004 2488 cmd.exe 29 PID 2488 wrote to memory of 2004 2488 cmd.exe 29 PID 2488 wrote to memory of 2004 2488 cmd.exe 29 PID 2004 wrote to memory of 3004 2004 rundll32.exe 30 PID 2004 wrote to memory of 3004 2004 rundll32.exe 30 PID 2004 wrote to memory of 3004 2004 rundll32.exe 30 PID 2004 wrote to memory of 3004 2004 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\baseline.prof1⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\baseline.prof2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\baseline.prof"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3004
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ecee00f6c595c9ed9b4d980c2c3f3121
SHA13f4c07417b34b79d81e868c13725fae0258420a9
SHA256b327fe280dd25d8e2c34cd831ebb15604a55859da9a29051a36d4b9a3835210b
SHA5122e6b4d6a0fb162198abe10ce916c14a7ce8efa265c6de2e35eb9abb65a8e80351039a1e9b1065779a9e93fa26b1cee7afd747fd51ba48a2e523f15eeb0dde550