Overview
overview
10Static
static
1b3c5e464e4...e3.zip
windows7-x64
1b3c5e464e4...e3.zip
windows10-2004-x64
1INVOICE#BU...03.vhd
windows7-x64
3INVOICE#BU...03.vhd
windows10-2004-x64
3$RECYCLE.B...2Y.lnk
windows7-x64
3$RECYCLE.B...2Y.lnk
windows10-2004-x64
3$RECYCLE.B...CZ.url
windows7-x64
1$RECYCLE.B...CZ.url
windows10-2004-x64
1$RECYCLE.B...JO.url
windows7-x64
1$RECYCLE.B...JO.url
windows10-2004-x64
1$RECYCLE.B...G6.lnk
windows7-x64
3$RECYCLE.B...G6.lnk
windows10-2004-x64
3$RECYCLE.B...O0.cmd
windows7-x64
1$RECYCLE.B...O0.cmd
windows10-2004-x64
1$RECYCLE.B...21.txt
windows7-x64
1$RECYCLE.B...21.txt
windows10-2004-x64
1$RECYCLE.B...65.vhd
windows7-x64
3$RECYCLE.B...65.vhd
windows10-2004-x64
3$RECYCLE.B...2Y.lnk
windows7-x64
3$RECYCLE.B...2Y.lnk
windows10-2004-x64
3$RECYCLE.B...CZ.url
windows7-x64
1$RECYCLE.B...CZ.url
windows10-2004-x64
1$RECYCLE.B...JO.url
windows7-x64
1$RECYCLE.B...JO.url
windows10-2004-x64
1$RECYCLE.B...G6.lnk
windows7-x64
3$RECYCLE.B...G6.lnk
windows10-2004-x64
6$RECYCLE.B...O0.cmd
windows7-x64
1$RECYCLE.B...O0.cmd
windows10-2004-x64
10$RECYCLE.B...65.vhd
windows7-x64
3$RECYCLE.B...65.vhd
windows10-2004-x64
3$RECYCLE.B...op.ini
windows7-x64
1$RECYCLE.B...op.ini
windows10-2004-x64
1Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-03-2024 14:35
Static task
static1
Behavioral task
behavioral1
Sample
b3c5e464e43d7db2432f3e28de75bd0eee8fa7a2b7b6fef7134e7115d6681be3.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b3c5e464e43d7db2432f3e28de75bd0eee8fa7a2b7b6fef7134e7115d6681be3.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
INVOICE#BUSAPOMKDS03.vhd
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
INVOICE#BUSAPOMKDS03.vhd
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$RECYCLE.BIN/$I47GN2Y.lnk
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$RECYCLE.BIN/$I47GN2Y.lnk
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
$RECYCLE.BIN/$I6AKHCZ.url
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$RECYCLE.BIN/$I6AKHCZ.url
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$RECYCLE.BIN/$I9BVFJO.url
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$RECYCLE.BIN/$I9BVFJO.url
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
$RECYCLE.BIN/$IAEXCG6.lnk
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$RECYCLE.BIN/$IAEXCG6.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
$RECYCLE.BIN/$IAH62O0.cmd
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$RECYCLE.BIN/$IAH62O0.cmd
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
$RECYCLE.BIN/$IFTQZ21.txt
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$RECYCLE.BIN/$IFTQZ21.txt
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
$RECYCLE.BIN/$ITQTF65.vhd
Resource
win7-20240215-en
Behavioral task
behavioral18
Sample
$RECYCLE.BIN/$ITQTF65.vhd
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
$RECYCLE.BIN/$R47GN2Y.lnk
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
$RECYCLE.BIN/$R47GN2Y.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
$RECYCLE.BIN/$R6AKHCZ.url
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
$RECYCLE.BIN/$R6AKHCZ.url
Resource
win10v2004-20240319-en
Behavioral task
behavioral23
Sample
$RECYCLE.BIN/$R9BVFJO.url
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
$RECYCLE.BIN/$R9BVFJO.url
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
$RECYCLE.BIN/$RAEXCG6.lnk
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
$RECYCLE.BIN/$RAEXCG6.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
$RECYCLE.BIN/$RAH62O0.cmd
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
$RECYCLE.BIN/$RAH62O0.cmd
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
$RECYCLE.BIN/$RTQTF65.vhd
Resource
win7-20240215-en
Behavioral task
behavioral30
Sample
$RECYCLE.BIN/$RTQTF65.vhd
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
$RECYCLE.BIN/desktop.ini
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
$RECYCLE.BIN/desktop.ini
Resource
win10v2004-20240226-en
General
-
Target
INVOICE#BUSAPOMKDS03.vhd
-
Size
12.0MB
-
MD5
48474a628c23106feb4587f36b68e5e2
-
SHA1
d34a9f2003a784774d9401e27a89ecf29817dc9d
-
SHA256
50c4bbc5e7bda11990739e93a32b18669d6142d0b155d1ee9509722659caa3bf
-
SHA512
5c5aa7dabd3b174639540e3a444e545eb67e6c256db5ac48efa6e68361d52a589b3124a297446ac08721909eb58a9dc516d3b21d40db4ec9431522456bf95f80
-
SSDEEP
6144:nlqlGC6H45QtiLJfhB+ZVBGIXcSIcnXy2wg9f5ZezrKWTPd:KLzC7yRqf5szrKQPd
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\vhd_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\vhd_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\vhd_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\.vhd\ = "vhd_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\.vhd rundll32.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\vhd_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\vhd_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\vhd_auto_file\ rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2452 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2452 AcroRd32.exe 2452 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2216 wrote to memory of 2844 2216 cmd.exe rundll32.exe PID 2216 wrote to memory of 2844 2216 cmd.exe rundll32.exe PID 2216 wrote to memory of 2844 2216 cmd.exe rundll32.exe PID 2844 wrote to memory of 2452 2844 rundll32.exe AcroRd32.exe PID 2844 wrote to memory of 2452 2844 rundll32.exe AcroRd32.exe PID 2844 wrote to memory of 2452 2844 rundll32.exe AcroRd32.exe PID 2844 wrote to memory of 2452 2844 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\INVOICE#BUSAPOMKDS03.vhd1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\INVOICE#BUSAPOMKDS03.vhd2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\INVOICE#BUSAPOMKDS03.vhd"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEventsFilesize
3KB
MD564f2c6f713611106f9d50f34d81150d5
SHA1d4069709fc74744c5fc26e50ff546ab8bc8f90b1
SHA256c3745217600e420d5474e1678ccaf5ab59858b306332c78ebedd3cd7e7d2c1aa
SHA5126aaec356a89a9d7e99d84c5bfe7f391ea7e6b6332b5c0e7d13a58c93c01ccae4cfaf95881847503eb96ce40a96026e0d0d50713d7bd59eb82a848ea3017da76b