Resubmissions

25/03/2024, 21:05

240325-zxdnnahe48 3

25/03/2024, 20:59

240325-zswcxahd77 3

25/03/2024, 20:56

240325-zq3dfahd45 3

25/03/2024, 20:51

240325-zm6xfshc96 3

25/03/2024, 20:45

240325-zj6ghsca7s 3

25/03/2024, 20:38

240325-zezs6shb67 3

25/03/2024, 20:36

240325-zdscpshb45 3

Analysis

  • max time kernel
    37s
  • max time network
    23s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25/03/2024, 20:51

General

  • Target

    Prefetch/CONFIGSERVICE.EXE-01160B6C.pf

  • Size

    4KB

  • MD5

    aabec26579082dc1b4d5ce6abf92db40

  • SHA1

    55a54d93ef058f0b240fd1298b0137e460431cc2

  • SHA256

    f48764ac2e6ce04e35ca0b889b7a92b51e117472cc5bd50c3b7cd44e6a51b08d

  • SHA512

    111c0c97fe5e0d92a50b481c3d430c5d572c18541d8ccd7f91c4dd9797686cb744a314712a209b6863dcaffddd0975a3e98d3f189f7069a7849ed3a9d598b77d

  • SSDEEP

    96:ctrQGHN2tEQjO+dMrtapUHFymQ5HQa/aZCP0ef2LkrXlO:CaEQjO+WtaoFMyNef2LkrXlO

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Prefetch\CONFIGSERVICE.EXE-01160B6C.pf
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2948
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Prefetch\CONFIGSERVICE.EXE-01160B6C.pf
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2384
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Prefetch\CONFIGSERVICE.EXE-01160B6C.pf"
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    f8d469d211392338761b69d50e307573

    SHA1

    47d52c5e6efe8c924371d45c4eb3119873f84f99

    SHA256

    59a64a16ccf1e8d3f8a7acf2be7fcbe48e73da061ff0661dee4a3bb22b3d58ca

    SHA512

    b72e932a8859724701447b4fdefd3938d2c021ad346c40f4193988a6c5dde3885d59ba72b3ac50ec8cd26e2ffd5a60ebbc9b9b1da3f16a7ce19b117450f6be55