Resubmissions

07/03/2024, 18:42

240307-xcfamsbf7z 8

07/03/2024, 16:34

240307-t23wfsff58 8

Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    07/03/2024, 16:34

General

  • Target

    08032024_0034_Open_Document.PDF.js

  • Size

    42KB

  • MD5

    c547de465c47116ac5b98e8c0d76ecf4

  • SHA1

    416b551c075d9299b7d1ecd1462f4376bbbead1f

  • SHA256

    c66e705f800b30f591505be1c429c2e01b7851eb60bda14767d9d871151822e5

  • SHA512

    305185c5ccb6e39016d9d6e1270e7639956a9f973dc2b74cb7c01569715f19ae918c965d48ad150938e3b60c58f038d01f9bc3116a8c95d9317cae4a9e148d7d

  • SSDEEP

    768:m6F9Zr0PxSR0He2Ut6+HgyrO/ubZQIoy7WHIcvp+EZvQAhXLNqYfDI:m6bd0ZSR0H6t6+AyOWbbTSH5vp+EZv7M

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 5 IoCs
  • Downloads MZ/PE file
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\08032024_0034_Open_Document.PDF.js
    1⤵
    • Blocklisted process makes network request
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1288
    • C:\windows\system32\control.exe
      "C:\windows\system32\control.exe" C:\Users\Admin\AppData\Local\Temp\50.cpl
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:344
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL C:\Users\Admin\AppData\Local\Temp\50.cpl
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2196
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 C:\Users\Admin\AppData\Local\Temp\50.cpl
          4⤵
          • Loads dropped DLL
          PID:1676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f52c5656e2b4512a8d0dd556204ac719

    SHA1

    3d06ab161cd0b4217afc89623d0982fe568d7f91

    SHA256

    e70f0befd4ec825c5229c35edbb97796ea173ef666fc078d03228c3937043d37

    SHA512

    ce193638ab30e0a649b7d914bae5ae6a4e9030381f5145abce1ad4af895a55c4187a9a60904f555091dcd298b2f2b9c6d1cad4e0c8e2123bd57463a8b8427977

  • C:\Users\Admin\AppData\Local\Temp\50.cpl

    Filesize

    401KB

    MD5

    a6a50b9ebbd177626ff34ef605390f36

    SHA1

    f6b11f0aedde6230c1af7f473c1176752b60fcbb

    SHA256

    1ca1315f03f4d1bca5867ad1c7a661033c49bbb16c4b84bea72caa9bc36bd98b

    SHA512

    471b9acf97d8914c1fe5bd0516fff27619baf3121f54ac8bc65b24c30b0a038831ca9c3ddb7a0a6ccadb7a6d9382f5ea7d582fbbb5a1d17bcc201f66cf33add5

  • C:\Users\Admin\AppData\Local\Temp\Cab174A.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar24B9.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63