Resubmissions
12/03/2024, 11:00
240312-m4d7jshb86 712/03/2024, 10:59
240312-m3g7tahb69 412/03/2024, 10:53
240312-my2ewsfb61 112/03/2024, 10:46
240312-mt968sha44 712/03/2024, 10:45
240312-mth3raha27 112/03/2024, 10:42
240312-mrtrgagh67 712/03/2024, 10:40
240312-mqwvfagh48 712/03/2024, 10:38
240312-mpq8kagg96 712/03/2024, 10:34
240312-mmbp4aeg7z 1Analysis
-
max time kernel
32s -
max time network
38s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 10:42
Static task
static1
Behavioral task
behavioral1
Sample
w3.org dummy.pdf
Resource
win10v2004-20240226-en
General
-
Target
w3.org dummy.pdf
-
Size
12KB
-
MD5
2942bfabb3d05332b66eb128e0842cff
-
SHA1
90ffd2359008d82298821d16b21778c5c39aec36
-
SHA256
3df79d34abbca99308e79cb94461c1893582604d68329a41fd4bec1885e6adb4
-
SHA512
f3b3ab3e6351e25b5c1882bea8d37efaddc0ea72bf153bb067688f775a26810d32b54f014bf1cebc7fe93042d85b18b5b453e322d154bc55d5cc2754b0dfb4b2
-
SSDEEP
384:8Xdp2nmyTBbQDcv6ZxmiiYcIWyGqBRnfU/LaLvWB27:G8mibQDcvSxm14Wy95fU/2TWk
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2192 AcroRd32.exe 2192 AcroRd32.exe 2192 AcroRd32.exe 2192 AcroRd32.exe 2192 AcroRd32.exe 2192 AcroRd32.exe 2192 AcroRd32.exe 2192 AcroRd32.exe 2192 AcroRd32.exe 2192 AcroRd32.exe 2192 AcroRd32.exe 2192 AcroRd32.exe 2192 AcroRd32.exe 2192 AcroRd32.exe 2192 AcroRd32.exe 2192 AcroRd32.exe 2192 AcroRd32.exe 2192 AcroRd32.exe 2192 AcroRd32.exe 2192 AcroRd32.exe 4448 mspaint.exe 4448 mspaint.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2192 AcroRd32.exe 2192 AcroRd32.exe 2192 AcroRd32.exe 2192 AcroRd32.exe 4448 mspaint.exe 4448 mspaint.exe 4448 mspaint.exe 4448 mspaint.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3564 wrote to memory of 4448 3564 cmd.exe 103 PID 3564 wrote to memory of 4448 3564 cmd.exe 103
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\w3.org dummy.pdf"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2192
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5080
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Downloads\PushRevoke.bmp"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4448
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:5024