Analysis

  • max time kernel
    143s
  • max time network
    184s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    03/01/2024, 19:37

General

  • Target

    locales\ar.pak

  • Size

    573KB

  • MD5

    cbeaafb259a3a0ad76739186e9b2bf75

  • SHA1

    11b348534a84c9648eb86c9790bfb7703cde242f

  • SHA256

    c28e612cae27402f2a75c9699268f1781b286748b0590d396e0a538e3aa67e49

  • SHA512

    2c91f17343d947cd4eb4d8d339e5932a3331445b4e826915d54196c29ce548b7e98a9b5f9857146a9a956ce20d3e624fb04b7c44d3c1a2593e8b6e2cb12662b0

  • SSDEEP

    12288:eCYtqr0jXjiRp/DvYUBuGYurA5SNbr+ATg5Y3MgSENFh:Z1Cuk52+k

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Modifies registry class 40 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of FindShellTrayWindow 20 IoCs
  • Suspicious use of SendNotifyMessage 14 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\locales\ar.pak
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2352
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\locales\ar.pak
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2832
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\locales\ar.pak"
        3⤵
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        PID:2672
  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32Info.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32Info.exe" /PDFShell -Embedding
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1808
  • C:\Program Files\VideoLAN\VLC\vlc.exe
    "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\WriteDisable.m4a"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:2036
  • C:\Program Files (x86)\Internet Explorer\iexplore.exe
    "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:576
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:584
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:584 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        PID:2436

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          41e9c8d275b02153993d763af9dc4b39

          SHA1

          58675e8130a18bd50a82d91a3aaf973741e55a24

          SHA256

          63fc7e57eab3ab0b78af5439036ff49bef2233fcc201be70f21a47895253ce40

          SHA512

          5c30e9ac5036a7a84c96be620f72df85ae0620f93fb4b8f41724a475610f132caaa53b75e54176ba7e1cbd8da962d2ce335c785b246452ed24a38f533f0e2af3

        • C:\Users\Admin\AppData\Local\Temp\CabA3F.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\TarB0D.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

        • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\AdobeSysFnt09.lst

          Filesize

          135KB

          MD5

          a3e82779d757fb4faf9cc73237c18b8a

          SHA1

          ea034b8be607b5244f71e3611aea533aba490177

          SHA256

          d4c9d7a37ef7b1dfa3411ff02127df69b6aab8f3e08abd8dacdaae5fb9fe0d9a

          SHA512

          b256f6f0e2566d86188ee56c9cf0e5ad28231a92cbea8368a178347ac75fa653f964340db541bddd7c7de7f66b918f2c51a4e8243b504b475c9ac09dd760c44f

        • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

          Filesize

          3KB

          MD5

          4e7840c4f0a729ba06421bc79fde02a5

          SHA1

          dcb846150c65492e564556b4f560f2b46855e98d

          SHA256

          8a4866b01fad746105f80f718ab5edf4da1a3b4b38224d32ec554eb2ab79cbde

          SHA512

          fd932a94492fb8c96189087d89ac8dda551d32bc498712ec543f74d47fad945bec26391e39c6ab19026c573fde1e20f101cbe756f676f8ceefb2a77ebea36f14

        • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\UserCache.bin

          Filesize

          70KB

          MD5

          8a4ac03151d32a8b50a8a9de78bc2e30

          SHA1

          cc50ef0acdc93dd1e6a74de1ce463906e74b5a8c

          SHA256

          723959d317a8cf3d06eb8a62ba288a7d1032f00fbecff540b56f0b72555b97e5

          SHA512

          5f7b726e05fb2fcf2a4f3422925fdf850b27e9fa5a331981059f19fa4a55f133a4d7904f14d0147dd873a918bb607a5da34ce0aef652ed197170de0efb8cac2b

        • memory/2036-59-0x000000013F4F0000-0x000000013F5E8000-memory.dmp

          Filesize

          992KB

        • memory/2036-63-0x000007FEF7440000-0x000007FEF7474000-memory.dmp

          Filesize

          208KB

        • memory/2036-66-0x000007FEF6A60000-0x000007FEF6D14000-memory.dmp

          Filesize

          2.7MB

        • memory/2036-67-0x000007FEF4C60000-0x000007FEF5D0B000-memory.dmp

          Filesize

          16.7MB

        • memory/2036-68-0x000007FEF4100000-0x000007FEF4212000-memory.dmp

          Filesize

          1.1MB