Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/02/2024, 12:21
Static task
static1
Behavioral task
behavioral1
Sample
settings.dat
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
settings.dat
Resource
win10v2004-20240226-en
General
-
Target
settings.dat
-
Size
152B
-
MD5
47b2c6613360b818825d076d14c051f7
-
SHA1
7df7304568313a06540f490bf3305cb89bc03e5c
-
SHA256
47a22bea2e7d0154c59bf5d8790ec68274eb05e9fa6cf0eab0d648121f1a02ac
-
SHA512
08d2366fc1ce87dbe96b9bf997e4c59c9206fcfea47c1f17b01e79aeb0580f25cac5c7349bb453a50775b2743053446653f4129f835f81f4a8547ca392557aac
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\.dat\ = "dat_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\dat_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\dat_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\dat_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\dat_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\dat_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\.dat rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\dat_auto_file\shell\Read\command rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2492 AcroRd32.exe 2492 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2600 1684 cmd.exe 29 PID 1684 wrote to memory of 2600 1684 cmd.exe 29 PID 1684 wrote to memory of 2600 1684 cmd.exe 29 PID 2600 wrote to memory of 2492 2600 rundll32.exe 30 PID 2600 wrote to memory of 2492 2600 rundll32.exe 30 PID 2600 wrote to memory of 2492 2600 rundll32.exe 30 PID 2600 wrote to memory of 2492 2600 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\settings.dat1⤵
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\settings.dat2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\settings.dat"3⤵
- Suspicious use of SetWindowsHookEx
PID:2492
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD551be9f74b7d77a8729b93ab7125b6cbf
SHA142fa707a9b308d933bd1286a4966d1c05df3bf82
SHA25699f001d59ca80314be893a81dbe3b764618cf2461a7e36228fb04b279cd88c68
SHA51283bb318a554ce36f13a536d4665c5dcd118731784460701e85075eef06dfa41b8d4167a81554ccb6cdcf6bcf36992858b93edd4c29b03edd1db08b9c2eda2df9