Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/03/2024, 06:48
Static task
static1
Behavioral task
behavioral1
Sample
5a5d2dc9-bbf7-44c4-9c8e-b3121e11fb9a[1].dat
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5a5d2dc9-bbf7-44c4-9c8e-b3121e11fb9a[1].dat
Resource
win10v2004-20231215-en
General
-
Target
5a5d2dc9-bbf7-44c4-9c8e-b3121e11fb9a[1].dat
-
Size
18.7MB
-
MD5
dfc045b504e823f9c6073a4d67dba703
-
SHA1
891dd881e5bfdfaff000304f4038469d64245aea
-
SHA256
3519e09e85e7a59d7740b3aaeafda5c518b81b2e2a02cb1a81e41c5ef00f57db
-
SHA512
b563adbacd807efe6ee0bd196600337cf1c603d0cb70c2aea3718cba84b1a4c7e07d64df1eefc9e175c7af1a2c67c469fbfaed0bbbe5329a05f845714f412085
-
SSDEEP
393216:IPZ9SI9z8LhfZVNo4ApQfQ+uSxo0fMbrjsW7ajZ+ZI/MsvJu2YZS:IPZ9H98BXAp4QG8brjR7kl9x1V
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2688 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2688 2112 cmd.exe 29 PID 2112 wrote to memory of 2688 2112 cmd.exe 29 PID 2112 wrote to memory of 2688 2112 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\5a5d2dc9-bbf7-44c4-9c8e-b3121e11fb9a[1].dat1⤵
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\5a5d2dc9-bbf7-44c4-9c8e-b3121e11fb9a[1].dat2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2688
-