Analysis

  • max time kernel
    18s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19-02-2024 04:41

General

  • Target

    01e97d18-844d-4843-b99a-f934fbe1a64d.pcap

  • Size

    49.4MB

  • MD5

    5c98d8dfc35e065ebd433f0639876c35

  • SHA1

    adbc283af88ab5fa7945eb301bb4a6fa8c6c6754

  • SHA256

    f636dc5694e7e57a842d86c09efdd233ae01330b5f1a70dd0245b5769fad3eb3

  • SHA512

    7bae46578884753b6ea51cd6ff16068648b62ba0da8a7076fb7457ff91c8c336eca2569c787173c9a0db7b6e215a85aea5c45fcec288d4b5c4d12dda260efc3c

  • SSDEEP

    1572864:pY/I1sSQZcFESdr4uP6XtDCJjXM2f5stXMjaFV:pY/I1tk0ECr4y6X9255EuaFV

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\01e97d18-844d-4843-b99a-f934fbe1a64d.pcap
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2128
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\01e97d18-844d-4843-b99a-f934fbe1a64d.pcap
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2956
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\01e97d18-844d-4843-b99a-f934fbe1a64d.pcap"
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    f4a76652fa73711bce1edb621777b8cd

    SHA1

    3d64e9d9e27edc6d198494d06c1684a11ecc2601

    SHA256

    c21ecad0fd4927e626af90aac1e8089e909fcdb620d7ad031d0a63fd4e3263ed

    SHA512

    a3b6ff1c1b37d7463e30ee6ec7570bdcbaa65ab2ccf261d34e9f1b55c3bc6f89ddc28d0eb02b9feb51ae613974568c5b45db660f6742e9b3e4c3e5f47a562264