Overview
overview
7Static
static
7mc chet/Project4.dll
windows7-x64
1mc chet/Project4.dll
windows10-2004-x64
1mc chet/Pr...hl.exe
windows7-x64
7mc chet/Pr...hl.exe
windows10-2004-x64
7out.exe
windows7-x64
3out.exe
windows10-2004-x64
3mc chet/injmthd.ini
windows7-x64
1mc chet/injmthd.ini
windows10-2004-x64
1mc chet/mycfg.cfg
windows7-x64
3mc chet/mycfg.cfg
windows10-2004-x64
3mc chet/shiza.dll
windows7-x64
1mc chet/shiza.dll
windows10-2004-x64
1Analysis
-
max time kernel
34s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-03-2024 13:14
Behavioral task
behavioral1
Sample
mc chet/Project4.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
mc chet/Project4.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
mc chet/Project4.hl.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
mc chet/Project4.hl.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
out.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
out.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
mc chet/injmthd.ini
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
mc chet/injmthd.ini
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
mc chet/mycfg.cfg
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
mc chet/mycfg.cfg
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
mc chet/shiza.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
mc chet/shiza.dll
Resource
win10v2004-20240226-en
General
-
Target
mc chet/mycfg.cfg
-
Size
22KB
-
MD5
5c8b2bf2a318bbe97d82b0625b87b4d9
-
SHA1
e63e672129412bb01f54bbffb019f244042ba726
-
SHA256
c26be3a07e6bbcc60a1cec7e4e861cd05debb4dc9c52317c24bcae5c2ab6c46c
-
SHA512
1dbb727001c607863020faccc026fccf4d8561c315d1d2c89382a09067ca0a3e2068beae797a6e2c58ca0f2b4498e740196cc5920af4f6ac777fd7a7d3cf7688
-
SSDEEP
384:CXBuTPXYmxiBKzH+HEPKybhSAarQrI7LgSw:LSAartzw
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\cfg_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\cfg_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\.cfg rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\cfg_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\cfg_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\.cfg\ = "cfg_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\cfg_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\cfg_auto_file\shell\Read\command rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2060 AcroRd32.exe 2060 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2628 2852 cmd.exe 29 PID 2852 wrote to memory of 2628 2852 cmd.exe 29 PID 2852 wrote to memory of 2628 2852 cmd.exe 29 PID 2628 wrote to memory of 2060 2628 rundll32.exe 30 PID 2628 wrote to memory of 2060 2628 rundll32.exe 30 PID 2628 wrote to memory of 2060 2628 rundll32.exe 30 PID 2628 wrote to memory of 2060 2628 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\mc chet\mycfg.cfg"1⤵
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\mc chet\mycfg.cfg2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\mc chet\mycfg.cfg"3⤵
- Suspicious use of SetWindowsHookEx
PID:2060
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5dc00e1991430ed0e263e74a1929a5826
SHA1b95978f0c22a1f3e0bdbf05ec98308f61913c323
SHA256189c8cc3d01eef5140ab0437b067feab52daed39df0c624039fab579294ec041
SHA512e9b0ff42c6e81e0f68dd8801fb4139fe3f309dd2cfd01d56c53917e00e8f6328dca5c04cec9cfb044d752fa6f94ca939bd3706a2f460556d525e1142be52b26a