Analysis

  • max time kernel
    119s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23-02-2024 13:10

General

  • Target

    locales/es-419.pak

  • Size

    515KB

  • MD5

    5abcb35738fcb4217888925eaa8f943b

  • SHA1

    a195fb95343d2fad6ec79a80efc848497f2b0083

  • SHA256

    51ff321a6612d56daabc7874ec306680f610c391ff4392c61a59d3ac2a3380b5

  • SHA512

    1272ddc6310fa9135e327111c6426fff39187df07d770b9fb366d6a87922e5ee1dd81cc676b17f8ed6370b786badf92c850910674ef5dadcef3bc7987ea62d3c

  • SSDEEP

    3072:Ln1o/wiAUJHOkNejz28CU1g6Cjnp4EcO37Su8pnYl4lbjK2oE1AozsoLhWRR5BXF:LnAwlsejlHDXzpnY8KJ5BXmLFmQIzL5

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\locales\es-419.pak
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\locales\es-419.pak
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2588
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\locales\es-419.pak"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    750442ea07dbca8446b3117146cdfd18

    SHA1

    b96fee16d5e082d850342d79c436496245d698e4

    SHA256

    1d5d1be75e8b1b4d4c6d5053a212f739a2d4774b3357a706cd7fe713839cd8ec

    SHA512

    c0b9389e6093fbf0a6f7ccec38e7384225212463aabb73a6c5d3b3c83a11087d084a79c0c9cfa5a964693cb087fa6c281dcdce60320fc41f3a327cc6cba7a5b7