Analysis
-
max time kernel
843s -
max time network
848s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
06/11/2023, 16:17
Static task
static1
Behavioral task
behavioral1
Sample
spine_2d.torrent
Resource
win7-20231020-en
4 signatures
1200 seconds
Behavioral task
behavioral2
Sample
spine_2d.torrent
Resource
win10v2004-20231020-en
12 signatures
1200 seconds
General
-
Target
spine_2d.torrent
-
Size
77KB
-
MD5
406f2965dfdbb3fe4c87d60c3eaea5f7
-
SHA1
cfe74a0fb7687d5719f512dee1736166163a39c6
-
SHA256
bc4cf4fb88e68267cf3e912ff92a8cd737d05be99b9ea2f73001aef7c69256b6
-
SHA512
b0cc608e2a69bcefa6e99b8a4ce261f4822ff4ca3df3881f4ba2bafe094203142bca119e86ae4b82a89df7f0d5fe2b808cbb3c09fcc9007c81c416a04d03d0ee
-
SSDEEP
1536:i526HSJXDdArbBqBoG4zZvb17tLtk8/RKFrqF0+FF9l3rQ1cLW1B1qdGjAFdM0:r6T3rQMoUGkFdX
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000_CLASSES\torrent_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000_CLASSES\torrent_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000_CLASSES\torrent_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000_CLASSES\torrent_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000_CLASSES\torrent_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000_CLASSES\torrent_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000_CLASSES\.torrent rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000_CLASSES\.torrent\ = "torrent_auto_file" rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2848 AcroRd32.exe 2848 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2804 1940 cmd.exe 29 PID 1940 wrote to memory of 2804 1940 cmd.exe 29 PID 1940 wrote to memory of 2804 1940 cmd.exe 29 PID 2804 wrote to memory of 2848 2804 rundll32.exe 30 PID 2804 wrote to memory of 2848 2804 rundll32.exe 30 PID 2804 wrote to memory of 2848 2804 rundll32.exe 30 PID 2804 wrote to memory of 2848 2804 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\spine_2d.torrent1⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\spine_2d.torrent2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\spine_2d.torrent"3⤵
- Suspicious use of SetWindowsHookEx
PID:2848
-
-