Resubmissions

11-08-2024 12:15

240811-pfbgvstblg 7

Analysis

  • max time kernel
    34s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    28-01-2024 08:18

General

  • Target

    SMM_WE/data.win

  • Size

    56.2MB

  • MD5

    a0e17999c86a2a56d9771f5ddfbfcb33

  • SHA1

    3a068e1901e708fa48baf72c14b92b418d81df8c

  • SHA256

    5688bd7b0b1f2d584d40e4e70a9c678d3e617ba78454f0d1df93ce8c8b13eed6

  • SHA512

    24142bd50d14b9f6172509b6c65055ad265471cf96b55a8d5ab782b448ae9b4c8380bad2e0ad6bf3ff38781ebb2b1d4a52a5dd0c0bd26e4561919dbffc5d61d7

  • SSDEEP

    1572864:XSqavhLr1JDjzl9+e4zHcTv28zUDkM/gKgSBhW:XSqaJrrjP+AyoMIIjW

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\SMM_WE\data.win
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2744
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\SMM_WE\data.win
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2628
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\SMM_WE\data.win"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2592

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    0ba471d026cff5de95db8d9ac1485c1f

    SHA1

    08dab4671a8a03ba627b63026c783ef048aaa260

    SHA256

    746c142c941b6314e01e0d02649c6a000887d1ed3ed95c63079639478942d314

    SHA512

    afe60df3069116a2fa65740dd764272c857d88c787d2e7f9a5506b5ac37e35bcf1df2b67671d80da79820b8f47eced21857fd80023b500a2e6b2e28d8597c960