Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231130-en -
resource tags
arch:x64arch:x86image:win7-20231130-enlocale:en-usos:windows7-x64system -
submitted
12-12-2023 10:23
Static task
static1
Behavioral task
behavioral1
Sample
Nicht bestätigt 635686.crdownload
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
Nicht bestätigt 635686.crdownload
Resource
win10v2004-20231130-en
General
-
Target
Nicht bestätigt 635686.crdownload
-
Size
332KB
-
MD5
2f01e339f1facf12d0c2eaa84e1fbce4
-
SHA1
026ca8ed7d69b2fdd43589a1c8bdf981f17bb2cb
-
SHA256
b972b5c3f2d253aa1cbd1693b4cd2e224c14b490ea6cb6fffbab79e91ab58289
-
SHA512
3f13f8d057739adbc3d001bdd0c1635a7fbbd1253f9d2455c182b00240a1516a7e5fc7c96bcc1db1f92a9704ad466917b0e64c20d18f7042fdc7451990734433
-
SSDEEP
6144:TKHS1X7Tmw3LRil1dNktzY8k3a0hAV0MhG44Q+ItH9awe0SiKY7RslxJ:TKOX7TmgmwtzhkK0hAO5QptEwFH7mlxJ
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000_CLASSES\crdownload_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000_CLASSES\.crdownload rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000_CLASSES\crdownload_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000_CLASSES\crdownload_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000_CLASSES\crdownload_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000_CLASSES\.crdownload\ = "crdownload_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000_CLASSES\crdownload_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000_CLASSES\crdownload_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2676 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2676 AcroRd32.exe 2676 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2536 2188 cmd.exe 29 PID 2188 wrote to memory of 2536 2188 cmd.exe 29 PID 2188 wrote to memory of 2536 2188 cmd.exe 29 PID 2536 wrote to memory of 2676 2536 rundll32.exe 30 PID 2536 wrote to memory of 2676 2536 rundll32.exe 30 PID 2536 wrote to memory of 2676 2536 rundll32.exe 30 PID 2536 wrote to memory of 2676 2536 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Nicht bestätigt 635686.crdownload"1⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Nicht bestätigt 635686.crdownload2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Nicht bestätigt 635686.crdownload"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2676
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD56a0ce604a611d9d50dac875f88f51c98
SHA14537e8404b444c326e6e0eedd17f9a2c7bf67a6b
SHA256ae71b8472c25b521ab2ed94d10834575c505077822e5a100cfda765b19194e28
SHA512164e97ac5dcd9bfa80f058b9deb2230c74d9e3e9a92b4bd0fe3d12157c22803ee5d745f19c762002aed0f9593a216b18f6b61efc4ca02e7247e7668219ee3494