Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-03-2024 15:59

General

  • Target

    OAEXPTOOL/linux_install.sh

  • Size

    105B

  • MD5

    2a8850e4990b9cf59e93a348f5629f0d

  • SHA1

    009e363ca636d148f7cf38db65a6675fca97a3df

  • SHA256

    9689529b715520b9c69e5b7af85ab217a002d47c648165586e0544517254589f

  • SHA512

    89086cef3d8a2b01ff56669a913a6b796914d83725800d9a3459bcc325498a30c8249fbd7dbbf4b3e1b61fa4859d41ccb2a9eb72330fcc322e33318c58578ead

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\OAEXPTOOL\linux_install.sh
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1796
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\OAEXPTOOL\linux_install.sh
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2680
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\OAEXPTOOL\linux_install.sh"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2468

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    5660e05166c97f6eef466bfa8cff686e

    SHA1

    c97068d05df1bdb430cdda25c6a89f65c956c027

    SHA256

    6916f3fc5346bd4668edee86210bb7ca3331d535202a3acbd74387a06b227842

    SHA512

    3a5df0cc6ed012b197ac85183b230aa49dabbdc52ef35176f512f8629d9ec37f1485c1b880530db72f4f5892b3f8d336ca55a61d029823bce830ec66f6772021