Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 03:33
Static task
static1
Behavioral task
behavioral1
Sample
s/go.sh
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
s/go.sh
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
s/ps
Resource
ubuntu1804-amd64-20231222-en
Behavioral task
behavioral4
Sample
s/scan
Resource
ubuntu1804-amd64-20231222-en
Behavioral task
behavioral5
Sample
s/scan
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral6
Sample
s/scan
Resource
debian9-mipsbe-20231222-en
Behavioral task
behavioral7
Sample
s/scan
Resource
debian9-mipsel-20231222-en
Behavioral task
behavioral8
Sample
s/ss
Resource
ubuntu1804-amd64-20231222-en
Behavioral task
behavioral9
Sample
s/ssh-scan
Resource
ubuntu1804-amd64-20231215-en
General
-
Target
s/go.sh
-
Size
125B
-
MD5
f8dab7c30afe989a3324752b9703449d
-
SHA1
487bc217f6f2415431a9134612aa0f4b14a8afa9
-
SHA256
be8424f3c8f6b8cdeb743d00a4891925704e9066f682efa26e22c860200cfc2b
-
SHA512
d384ac879447df1d94888c292ae670f4c03e5eb907d9c3bfa436acd7727ab625d45c506d525c57bcee73c0e7de368c70a88216406cc7e95a75d7de2ffe28d780
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\sh_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\.sh rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\.sh\ = "sh_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\sh_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\sh_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\sh_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\sh_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\sh_auto_file\ rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2816 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2816 AcroRd32.exe 2816 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2400 3000 cmd.exe 29 PID 3000 wrote to memory of 2400 3000 cmd.exe 29 PID 3000 wrote to memory of 2400 3000 cmd.exe 29 PID 2400 wrote to memory of 2816 2400 rundll32.exe 30 PID 2400 wrote to memory of 2816 2400 rundll32.exe 30 PID 2400 wrote to memory of 2816 2400 rundll32.exe 30 PID 2400 wrote to memory of 2816 2400 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\s\go.sh1⤵
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\s\go.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\s\go.sh"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2816
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD554b018435b0eb326f236e3eb1310a796
SHA1df7411fe7fa1623ea3ace9407ab5f9f8c4634343
SHA256a441c9589d103a9480f92ef0947f92536bc7d99d301f72ced9f08d13133a8b47
SHA51240f6ca799c9dc999f2a7fea436743d62da65ab80e54e7bdc57af6f92d7a7b35c02b647a11199fcf6694edaea2c9fe507694eebf184bd0a8df6a35cf4fdc21c79