Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-03-2024 17:48
Static task
static1
Behavioral task
behavioral1
Sample
Keys 17.0.0.rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Keys 17.0.0.rar
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Keys 17.0.0/prod.keys
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Keys 17.0.0/prod.keys
Resource
win10v2004-20240226-en
General
-
Target
Keys 17.0.0.rar
-
Size
7KB
-
MD5
bcbe7eceea53a4de9613d421e9ee3d5f
-
SHA1
82b4da83f68dd7763f7a10dfc61cc8c4b9a6718b
-
SHA256
efd2a353a9d84e4c5896e1378f8c9f4c9edc02323fc6a2d237d0cbbada28e99c
-
SHA512
23d986a61097cefafcfde6503232d74081794309fb0a01bac1b8fc60e84eaa55dcf5304cb4762cc37106f1f66acbfff425f66230597ec9da999e928f123168f7
-
SSDEEP
192:vScR0XavWmnGzJCCAK1tgvUQ+AyvpeBhgnC6ZHipa3XmKatTK:RxvWmnGzJaatkCA1u/qSXBye
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.keys rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\keys_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\keys_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\keys_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.keys\ = "keys_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\keys_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\keys_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\keys_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2560 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 2560 7zFM.exe Token: 35 2560 7zFM.exe Token: SeSecurityPrivilege 2560 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2560 7zFM.exe 2560 7zFM.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2464 AcroRd32.exe 2464 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 340 wrote to memory of 2560 340 cmd.exe 29 PID 340 wrote to memory of 2560 340 cmd.exe 29 PID 340 wrote to memory of 2560 340 cmd.exe 29 PID 2180 wrote to memory of 2464 2180 rundll32.exe 32 PID 2180 wrote to memory of 2464 2180 rundll32.exe 32 PID 2180 wrote to memory of 2464 2180 rundll32.exe 32 PID 2180 wrote to memory of 2464 2180 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Keys 17.0.0.rar"1⤵
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Keys 17.0.0.rar"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2560
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\Keys 17.0.0\prod.keys1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\Desktop\Keys 17.0.0\prod.keys"2⤵
- Suspicious use of SetWindowsHookEx
PID:2464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD54ed853d4a52e6b9b9e11954f155ecb8a
SHA1d6cedce971a2a4ab2588e39285a9d2fb37b62924
SHA25676df55f85c6628cd924f227a72a301bbb731833c0a0f00c440e01e6b34480990
SHA512270807500ee0e4a2414efe7d05d59fb2fd17830a2433342a06502355ddc8694b667760a8d2cd50a150d529c21dcdc243bce026251f00ccbcfde403d44064c59b