Analysis

  • max time kernel
    104s
  • max time network
    35s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11/03/2024, 17:43

General

  • Target

    web-client/translations/lt.json

  • Size

    109KB

  • MD5

    26f6fe0f7a077a0a32ccea96c2b820cc

  • SHA1

    5388c7826c9ef4526e50aee33a470b572a35728d

  • SHA256

    20913922b3befd5ba5244fbec3eddce654558a7e11cdeeee931dc7b8c0c04129

  • SHA512

    3a67578b39254d088e559527dd6721b5e6af0453da6d04c678e14de8c59330e1ba9dd9a77f9722b5a3d44a14ab8b32fa7080729cb2424e1640a274b9e6b77af1

  • SSDEEP

    3072:QQJqrvrxw3XH5i7R+jZC/PYDBQIdqLdLVICs:P1aAI9s

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\web-client\translations\lt.json
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2216
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\web-client\translations\lt.json
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2868
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\web-client\translations\lt.json"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    8daa728688b420a95b96ca465c9d0e20

    SHA1

    e734a36490caa464e864deef257596954b4fed8a

    SHA256

    58618e868727eb79bd2754aaa086c2d18afea09066eef280f1f1d82cf5ebf766

    SHA512

    e90085c024a4a498f9ea7aee64be9b787352087c5d5469a7e580e11c91566f979e62c04afbca5899d043083d9fb98e7b3661993482f334dca763d6375a3f9b7d