Resubmissions

03-02-2024 06:55

240203-hp5czabeg7 7

03-02-2024 06:52

240203-hnee6adhdp 7

03-02-2024 06:46

240203-hjl97sbdh3 7

03-02-2024 06:41

240203-hfs9cadfhl 3

03-02-2024 06:38

240203-hebb5sdffl 3

03-02-2024 05:47

240203-gg3nqsaee9 8

03-02-2024 05:22

240203-f2tqwscdcm 7

Analysis

  • max time kernel
    173s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    03-02-2024 06:46

General

  • Target

    RAM_Data/il2cpp_data/Metadata/global-metadata.dat

  • Size

    5.3MB

  • MD5

    f5aca820c094dbffd211a7434214ca05

  • SHA1

    c0651b22cd6707d26180152c52828156da888bab

  • SHA256

    85f28068fefa457ce6f6e5c91cef44598f0e51730a1c66fe8be0e28551155569

  • SHA512

    1873027771c955011da12d30d37442e80fcc8474a32bde592b63541c4351298d3ace6841d61be066a563dd805ffa502a7e3618d29e1928dd04a957040016b1c8

  • SSDEEP

    49152:JkSyJpFOjriJJze72vEJP6yXk4JVGxflE2o3KBeQh1KuT:xrSTvEPXkB9AKLDKA

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\RAM_Data\il2cpp_data\Metadata\global-metadata.dat
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2756
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\RAM_Data\il2cpp_data\Metadata\global-metadata.dat
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2964
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\RAM_Data\il2cpp_data\Metadata\global-metadata.dat"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:3004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    2698d57987740f299ebe454135e21729

    SHA1

    c9076a40ece1ee63ec5cc5ac57a2219a45a9d522

    SHA256

    bd1e876406e6c512a644c949a6b9ba64292f5e95c7166d0dd904796234ec6546

    SHA512

    503e5d27179bc13105cd49ee5fd6ec032bd4dfc7c791c59691203b7747a2e9152eaf937db821487062d5ab68ec354e721abea4bea3475fa75eb149e1245294a0