Analysis
-
max time kernel
25s -
max time network
27s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 13:50
Static task
static1
Behavioral task
behavioral1
Sample
primetek_primefaces_cve-2017-1000486x69.nbin
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
primetek_primefaces_cve-2017-1000486x69.nbin
Resource
win10v2004-20240226-en
General
-
Target
primetek_primefaces_cve-2017-1000486x69.nbin
-
Size
42KB
-
MD5
697b743917aab7e39d3379b87fa2aeb1
-
SHA1
8739f486f539d41d78e6c2cef232cdb586d52a93
-
SHA256
ec9a574a9da5ba505144f5f5f69c11e378694abe3bf438c393e9946c8f2819df
-
SHA512
7b419b21d95e5ac9a4b58c0d6e595239d6f3357d616c0b52ce2f122654d79b738f81c3e18a01cbe92c8db4f72e482983111fd53bf0b29e743e55a77d47c96d9b
-
SSDEEP
768:JBHacthBsvi6g8gCkkflQJzS611w6sxyH5uonKxQzLcBy90NY49zSlv1VRcan:JBHaWsGNylQlS886PnYQzLlMYASlv2an
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2408 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2408 2880 cmd.exe 29 PID 2880 wrote to memory of 2408 2880 cmd.exe 29 PID 2880 wrote to memory of 2408 2880 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\primetek_primefaces_cve-2017-1000486x69.nbin1⤵
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\primetek_primefaces_cve-2017-1000486x69.nbin2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2408
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2844