Analysis

  • max time kernel
    121s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29/02/2024, 08:13

General

  • Target

    manifest.json

  • Size

    204B

  • MD5

    faa0ce7d349d4d7239d4bf9b6fb5bb2b

  • SHA1

    431f5cc52e5a3e6decd24b908986a2e79f9a687c

  • SHA256

    39620a6d6a5fe909f0847ba4ed17e1f22123ac6090662e4149f7606eae512734

  • SHA512

    730fb5c807b85e025d5639ffb58f3eff3cde58f7ce766529793b03de622a1679736e1f456e8dafd2d15d9dbe83c7272347d2a602add622f50c65d0825a4fee1b

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\manifest.json
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1324
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\manifest.json
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2596
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\manifest.json"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2124

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

          Filesize

          3KB

          MD5

          c79172419180110e01c7c48f6d0d1300

          SHA1

          0a07958124a12f459ae50418753ff16e3e1b768f

          SHA256

          1d60d731f92efba95d7b802d9654146f303e72f1786712fe3f3a6e7adad3a5d5

          SHA512

          c351ec90b262b6958d3db82acea0c5b4832f212c105d70c01886fd1c9dc907bc47aef21d1c75cfebd5f98d3cecd7b765931f6a10e7127ce6559b30d7ea0e27f8