Analysis
-
max time kernel
175s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
15-11-2023 11:15
Static task
static1
Behavioral task
behavioral1
Sample
admin-ajax.php
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
admin-ajax.php
Resource
win10v2004-20231023-en
General
-
Target
admin-ajax.php
-
Size
1B
-
MD5
cfcd208495d565ef66e7dff9f98764da
-
SHA1
b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
-
SHA256
5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
-
SHA512
31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000_CLASSES\php_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000_CLASSES\.php rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000_CLASSES\.php\ = "php_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000_CLASSES\php_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000_CLASSES\php_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000_CLASSES\php_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000_CLASSES\php_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000_CLASSES\php_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2540 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2540 AcroRd32.exe 2540 AcroRd32.exe 2540 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2656 2420 cmd.exe 30 PID 2420 wrote to memory of 2656 2420 cmd.exe 30 PID 2420 wrote to memory of 2656 2420 cmd.exe 30 PID 2656 wrote to memory of 2540 2656 rundll32.exe 31 PID 2656 wrote to memory of 2540 2656 rundll32.exe 31 PID 2656 wrote to memory of 2540 2656 rundll32.exe 31 PID 2656 wrote to memory of 2540 2656 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\admin-ajax.php1⤵
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\admin-ajax.php2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\admin-ajax.php"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2540
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5dcfb76cf9c6904747b865c75206e6455
SHA1eb7816caf9458151b6b3ad96db64a36635802dee
SHA256bd6d9589ff5229e7e85261bff931310d29e48e6d98427a621396c9fc73d6fa36
SHA512fab67f071017d59a3afe8d8a1a07cafc5a7f32e7162fe1c711d51805f13d81157d0f63a3b85592b432e09e1defbdaf95b98f870d961f0a94bf41282765ece251