Resubmissions

25/03/2024, 21:05

240325-zxdnnahe48 3

25/03/2024, 20:59

240325-zswcxahd77 3

25/03/2024, 20:56

240325-zq3dfahd45 3

25/03/2024, 20:51

240325-zm6xfshc96 3

25/03/2024, 20:45

240325-zj6ghsca7s 3

25/03/2024, 20:38

240325-zezs6shb67 3

25/03/2024, 20:36

240325-zdscpshb45 3

Analysis

  • max time kernel
    18s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25/03/2024, 20:59

General

  • Target

    Prefetch/UNIVERSALADBDRIVERINSTALLER.E-B475736B.pf

  • Size

    9KB

  • MD5

    5d5d7e52816f8338984a20d8328eb808

  • SHA1

    0098d661a1ed616a3ae629ff9e54558e8d1d3599

  • SHA256

    b41b1d221295a5ad00c39c4f1d86cc5cbadd1b07794866d1da8c68b84a7d3b59

  • SHA512

    b6afb3c23c97a87905cad4f7c38c06c12b00f33ae4a4be6dfbc7da07d041b955775c79f2a798499a7042734a75fbbbd31194b94c894ef8b4d208e8ce3e61b72a

  • SSDEEP

    192:xuxV367CsWP3zz1eHi+EM1Y+MB5NuphnEccAxJSKUnBPkfYrAN93QubCMzNW:oxVq74PjzsCf+MnNuphnEccG4nBWYYWN

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Prefetch\UNIVERSALADBDRIVERINSTALLER.E-B475736B.pf
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3004
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Prefetch\UNIVERSALADBDRIVERINSTALLER.E-B475736B.pf
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2512
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Prefetch\UNIVERSALADBDRIVERINSTALLER.E-B475736B.pf"
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2076

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    74bed10b14ac3454fceb265f5db46642

    SHA1

    a7b833477cc6fec54de07931595656f2ba941ca5

    SHA256

    e111d857474c6e0449975c17786de67ff60c82a439d7bafa53814471c3c97137

    SHA512

    6bdfbb0b56767f34333436f90c4c6059f84801a95c1369725bdf737e00fcb505bb40bb996dec517a29efa0617dacdf730bf48d1c9e6a0e73e0dc778d1cab4712