Analysis
-
max time kernel
38s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
20-11-2023 01:48
Static task
static1
Behavioral task
behavioral1
Sample
mushroom.gpl
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
mushroom.gpl
Resource
win10v2004-20231023-en
General
-
Target
mushroom.gpl
-
Size
330B
-
MD5
2464f21cddf58ea25db040eb833010f6
-
SHA1
792c2cd4ee754a6da317b3a9c205933ab3fa4309
-
SHA256
a554d3a6a4dd01d75400e326044e7f596ae0311880a36501df367714397c3df9
-
SHA512
27e7a3038ce10bf1343904fe95e3a47bc94ee6756461b8da3526be73dc0f0a80f0a875f4168f3db353359cd5a9036b3f865cff0e972c36dd801b9d09823aff22
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000_CLASSES\.gpl rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000_CLASSES\gpl_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000_CLASSES\gpl_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000_CLASSES\.gpl\ = "gpl_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000_CLASSES\gpl_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000_CLASSES\gpl_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000_CLASSES\gpl_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000_CLASSES\gpl_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2716 rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2880 AcroRd32.exe 2880 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2716 2192 cmd.exe 29 PID 2192 wrote to memory of 2716 2192 cmd.exe 29 PID 2192 wrote to memory of 2716 2192 cmd.exe 29 PID 2716 wrote to memory of 2880 2716 rundll32.exe 30 PID 2716 wrote to memory of 2880 2716 rundll32.exe 30 PID 2716 wrote to memory of 2880 2716 rundll32.exe 30 PID 2716 wrote to memory of 2880 2716 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\mushroom.gpl1⤵
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\mushroom.gpl2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\mushroom.gpl"3⤵
- Suspicious use of SetWindowsHookEx
PID:2880
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD51759b734196f55cd97a98bacfaae4a75
SHA1ceaefa1e098ca4dbdbd9f2b1c17f8b9b8063e22a
SHA2560037af2175b305ca051c22a2b747fbba4e370fbe5cd3c536711f743e6a9945ee
SHA512e87e9e5bd90a8649ed4cacd85f09270f9cc5b2cf1ef3ec8600a48fd66b65bc4af72113f9b9652198c09012e3e6bdb24f7d7fc1233fe8a615500c1433a694a012