Analysis
-
max time kernel
18s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19-02-2024 04:41
Static task
static1
Behavioral task
behavioral1
Sample
01e97d18-844d-4843-b99a-f934fbe1a64d.pcap
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01e97d18-844d-4843-b99a-f934fbe1a64d.pcap
Resource
win10v2004-20231215-en
General
-
Target
01e97d18-844d-4843-b99a-f934fbe1a64d.pcap
-
Size
49.4MB
-
MD5
5c98d8dfc35e065ebd433f0639876c35
-
SHA1
adbc283af88ab5fa7945eb301bb4a6fa8c6c6754
-
SHA256
f636dc5694e7e57a842d86c09efdd233ae01330b5f1a70dd0245b5769fad3eb3
-
SHA512
7bae46578884753b6ea51cd6ff16068648b62ba0da8a7076fb7457ff91c8c336eca2569c787173c9a0db7b6e215a85aea5c45fcec288d4b5c4d12dda260efc3c
-
SSDEEP
1572864:pY/I1sSQZcFESdr4uP6XtDCJjXM2f5stXMjaFV:pY/I1tk0ECr4y6X9255EuaFV
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\pcap_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\.pcap rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\.pcap\ = "pcap_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\pcap_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\pcap_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\pcap_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\pcap_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\pcap_auto_file\shell\Read\command rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2852 AcroRd32.exe 2852 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2956 2128 cmd.exe 29 PID 2128 wrote to memory of 2956 2128 cmd.exe 29 PID 2128 wrote to memory of 2956 2128 cmd.exe 29 PID 2956 wrote to memory of 2852 2956 rundll32.exe 30 PID 2956 wrote to memory of 2852 2956 rundll32.exe 30 PID 2956 wrote to memory of 2852 2956 rundll32.exe 30 PID 2956 wrote to memory of 2852 2956 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\01e97d18-844d-4843-b99a-f934fbe1a64d.pcap1⤵
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\01e97d18-844d-4843-b99a-f934fbe1a64d.pcap2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\01e97d18-844d-4843-b99a-f934fbe1a64d.pcap"3⤵
- Suspicious use of SetWindowsHookEx
PID:2852
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f4a76652fa73711bce1edb621777b8cd
SHA13d64e9d9e27edc6d198494d06c1684a11ecc2601
SHA256c21ecad0fd4927e626af90aac1e8089e909fcdb620d7ad031d0a63fd4e3263ed
SHA512a3b6ff1c1b37d7463e30ee6ec7570bdcbaa65ab2ccf261d34e9f1b55c3bc6f89ddc28d0eb02b9feb51ae613974568c5b45db660f6742e9b3e4c3e5f47a562264