Analysis

  • max time kernel
    118s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13/02/2024, 22:01

General

  • Target

    locales/cs.pak

  • Size

    393KB

  • MD5

    26765c7be201444f0238962bb16a506b

  • SHA1

    f9d4a33795e45127c14bcf35cc770845627e15e8

  • SHA256

    936466784a55b965d23b016bc49377655bc5d281d012c8369c0809c961e05c74

  • SHA512

    577d52d2d5048cd952aff1e76121a495328c1978cdea2eaa4f85812cc513917f69510e135e96f7967f4ed43cf88e180cb1d9059e17c855c8d4f94ca036730214

  • SSDEEP

    6144:qEcblAZYhg7PlAKRM55Z8+U1KN0g588QM:qfJAahgrxM55Z8+UoN0gb

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\locales\cs.pak
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\locales\cs.pak
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2868
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\locales\cs.pak"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    79887e2281026fc8ccb7f5ec51e12f5c

    SHA1

    5b2f2c489bfcd14f5e34ea923abd4ccb2aba775b

    SHA256

    42b5fdb921a549dfb8644d33b2b302c3db7416b1d8e59f7fea3c8a9dd78d47d6

    SHA512

    12e2d1c4148e566a6105baf17409b40fd8d0b230aafbba309002f786de5e5cdc152bc4e2b9dc1a413848a99f620b3f9301c6f08b84087540066c0c46401bf1f7