Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
21-11-2023 15:51
Behavioral task
behavioral1
Sample
sample.tar
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
sample.tar
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
config.json
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
config.json
Resource
win10v2004-20231023-en
General
-
Target
config.json
-
Size
2KB
-
MD5
d06a009c3e52ab714532771de43609f3
-
SHA1
bc8d2890666d3e82d38f231b3f64a8be2120e347
-
SHA256
35afe0c53bb71cc551eba0939bf83384c0ae20b47011d30dc48679313b2ca8d9
-
SHA512
e08b3c92ad4453e76ffcbb505eb3baefac1ae32b74b255b591d25983a5e59faad19a83f282d036e0d3107786f31358da1b800b257c49296cb4ee2842fe623db0
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\json_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\json_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\.json rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\.json\ = "json_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\json_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\json_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\json_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\json_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2544 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2544 AcroRd32.exe 2544 AcroRd32.exe 2544 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2920 wrote to memory of 2672 2920 cmd.exe 29 PID 2920 wrote to memory of 2672 2920 cmd.exe 29 PID 2920 wrote to memory of 2672 2920 cmd.exe 29 PID 2672 wrote to memory of 2544 2672 rundll32.exe 30 PID 2672 wrote to memory of 2544 2672 rundll32.exe 30 PID 2672 wrote to memory of 2544 2672 rundll32.exe 30 PID 2672 wrote to memory of 2544 2672 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\config.json1⤵
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\config.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\config.json"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2544
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD51ee666c074159ec7b44d38b9ebb7af02
SHA133da46203101dad98cdb55d6c7647afad54e6c16
SHA25662587cb831687bae9fb09e6acee39def59ffc27c4414b3e70bd68ea647be8318
SHA51269a500c903926859e114691b394339db58b9942569a3d2ed787454bf4ee0866633c1d1921e5e0ffadc88db5278b146229b3a7fc5bf7af98ad45a867a723e64d3