Resubmissions

25-03-2024 21:05

240325-zxdnnahe48 3

25-03-2024 20:59

240325-zswcxahd77 3

25-03-2024 20:56

240325-zq3dfahd45 3

25-03-2024 20:51

240325-zm6xfshc96 3

25-03-2024 20:45

240325-zj6ghsca7s 3

25-03-2024 20:38

240325-zezs6shb67 3

25-03-2024 20:36

240325-zdscpshb45 3

Analysis

  • max time kernel
    18s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-03-2024 20:36

General

  • Target

    Prefetch/APPINSTALLERFULLTRUSTAPPSERVI-ADC5D7F4.pf

  • Size

    9KB

  • MD5

    6a2f494245822149e60975e62ae7ceef

  • SHA1

    173e49008a45f9c1589d675b3fd4e21b3507d185

  • SHA256

    78b813ea7c561c94f9ee8e8ef6796a35d5a4d14f389d2a5bcbae1ad1513b908b

  • SHA512

    6a4f030e4150f84ec19ba0fdb9623f8afffce7ad26164161f551387e62a351feeff4fb13780b8a4d2e48ded50cf04ab3f9dfad45fcf43af19483dffeadde6f61

  • SSDEEP

    192:5P0Rl+nK9JLlqPbnEa7hbk7HVT1AYauYP/DwEpSvYT/onI+jT7CR0NtawbJldabB:+Rl+K9JLcjnP9m51AgYzwTv6AnIKT7CN

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Prefetch\APPINSTALLERFULLTRUSTAPPSERVI-ADC5D7F4.pf
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2972
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Prefetch\APPINSTALLERFULLTRUSTAPPSERVI-ADC5D7F4.pf
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2516
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Prefetch\APPINSTALLERFULLTRUSTAPPSERVI-ADC5D7F4.pf"
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    8e50a25e0b176e734471f0c85f490ec1

    SHA1

    3ff45b92bc299901bafb742781cdffa1530f8100

    SHA256

    4f716b12566d3d7456eb4b56c9ff5cca9dee1bbf936cee4d5906bf4e5b2cb23b

    SHA512

    d6e4feb621bbbd9c997a0577e67998187c3c3e3a8adf8d8af9b4cd9e20cedb6ebcef71503d345c048b563cf7e65a73995c28d6e4ff58a11af32bcad57e58a1a6