Analysis

  • max time kernel
    120s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    02-03-2024 19:46

General

  • Target

    locales/da.pak

  • Size

    487KB

  • MD5

    426c1035169c079400d71e700cb7aa12

  • SHA1

    90fd4c7c1ec66cf7a4fbf528b0522c3670c5a99f

  • SHA256

    bbd28bfcfb94631347d4aa0ce0a0a756b7003fc486dc3360e0e7ecfc8fe1ee63

  • SHA512

    5290cd34d7022ad6048dae6e02f5c793cde949187cd5527c090be7818a2f2eb71602ee3ceb184a6abef325bfd33ef72ea582a85ab989c2efaad10eadebebaee3

  • SSDEEP

    6144:ZZchZvfVKzV0sN5cvfAe914eA4owlTamJw/zobqU9aFut55Prms+zd4bTGqewc:ZZchn4yAN4aHK5xrXTpM

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\locales\da.pak
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\locales\da.pak
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2676
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\locales\da.pak"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    0779c3f0bc5417173d5af6a565b2bb70

    SHA1

    59ce6b1e28f84c2d549bfb51064187518e2a7e28

    SHA256

    6fc3a6601ce30d1c70bb12b8f00c8be91fd9f2289085668e3d3b2b937da4e00d

    SHA512

    990145d7a0545f0e63f10b5ea8c1fe3162959d1f4af3f9ad9c2b05bf80aae66f466ea3df24a3083452df0ef1ed6ec3b4bbba7d47d2ee7ee7b5af8ccc198c1a91