Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
23-01-2024 08:24
Static task
static1
Behavioral task
behavioral1
Sample
w.sh
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
w.sh
Resource
win10v2004-20231222-en
General
-
Target
w.sh
-
Size
838B
-
MD5
39100bf4ac60acc5d1da4e79ae97f024
-
SHA1
a3d2ac5ed4d6306d8e9fc6b44eb35254bca206ef
-
SHA256
3c059b43edd2241ca0e29ed5aa17157ec82a8717463dbbd0e42e6a08abccc900
-
SHA512
9677c8c0cb6840e4cf32953a555d801b4810fa47145f4442bac8696a506adc37366a4b0da83cf49449d639c582667e8ac974b84cc5880cd9b2b8e6d79d5eaa8a
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\.sh rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\sh_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\sh_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\sh_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\.sh\ = "sh_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\sh_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\sh_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\sh_auto_file rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2316 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2316 AcroRd32.exe 2316 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2736 3052 cmd.exe 29 PID 3052 wrote to memory of 2736 3052 cmd.exe 29 PID 3052 wrote to memory of 2736 3052 cmd.exe 29 PID 2736 wrote to memory of 2316 2736 rundll32.exe 30 PID 2736 wrote to memory of 2316 2736 rundll32.exe 30 PID 2736 wrote to memory of 2316 2736 rundll32.exe 30 PID 2736 wrote to memory of 2316 2736 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\w.sh1⤵
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\w.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\w.sh"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2316
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ea83996ff4556be2573a6771ad2605e0
SHA10ad3b486704c3834dc4166a344579602f8cb99d5
SHA256d9c760487727901bb2696ff3c7f4799eaa6cc0dcdc0cae13fee5cab3ace67702
SHA5120415fe5b04753ac7c0cbc599069cbf3f016dd92ecfdfbd20121fba5bc55c4e9c05e79103407905bb131ba7158850d6d89653dae05809447c91a9873871bd69ef