Resubmissions

25/03/2024, 21:05

240325-zxdnnahe48 3

25/03/2024, 20:59

240325-zswcxahd77 3

25/03/2024, 20:56

240325-zq3dfahd45 3

25/03/2024, 20:51

240325-zm6xfshc96 3

25/03/2024, 20:45

240325-zj6ghsca7s 3

25/03/2024, 20:38

240325-zezs6shb67 3

25/03/2024, 20:36

240325-zdscpshb45 3

Analysis

  • max time kernel
    18s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25/03/2024, 20:59

General

  • Target

    Prefetch/UPFC.EXE-89D4FAEB.pf

  • Size

    3KB

  • MD5

    6cfedbda039476a4ad0bc89a39ece733

  • SHA1

    e35ea1f98ce8e4241d95d9ce95f8ea9f7e7d1520

  • SHA256

    41f0a0fbe8851319e36b840215c383b99e5785a2734264b56fe547a461f0d9b1

  • SHA512

    4d3d89a5f7feeeac8e733e14afdbc1556dc06499101b61e73cb951fe18e90a956839d6d77c2d01b12ea6fbc7f39f09df025a96b3a18192e388baa485903a6627

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Prefetch\UPFC.EXE-89D4FAEB.pf
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2860
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Prefetch\UPFC.EXE-89D4FAEB.pf
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2636
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Prefetch\UPFC.EXE-89D4FAEB.pf"
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    569f5598956f925e3b5af0bcd46d84e2

    SHA1

    934915275e4c523aa2a4a61258e802bc41c0f1e2

    SHA256

    5b45c19dd723f1d963b252445dfdaee6057a13a202deb395f036c65650939b21

    SHA512

    d3128cd860b034b1922ab1cbac669c1326ea9e061f1fa6d6c6ae81c40c7673d5e3deca474ed235f7cd6399d9058f8020daf21d826e758cb4b8f3a614ae62ccc4