Overview
overview
3Static
static
1Prefetch/T...F52.pf
windows7-x64
3Prefetch/T...F52.pf
windows10-2004-x64
3Prefetch/T...663.pf
windows7-x64
3Prefetch/T...663.pf
windows10-2004-x64
3Prefetch/T...088.pf
windows7-x64
3Prefetch/T...088.pf
windows10-2004-x64
3Prefetch/U...FF8.pf
windows7-x64
3Prefetch/U...FF8.pf
windows10-2004-x64
3Prefetch/U...F7D.pf
windows7-x64
3Prefetch/U...F7D.pf
windows10-2004-x64
1Prefetch/U...499.pf
windows7-x64
3Prefetch/U...499.pf
windows10-2004-x64
3Prefetch/U...F9A.pf
windows7-x64
3Prefetch/U...F9A.pf
windows10-2004-x64
3Prefetch/U...053.pf
windows7-x64
3Prefetch/U...053.pf
windows10-2004-x64
3Prefetch/U...36B.pf
windows7-x64
3Prefetch/U...36B.pf
windows10-2004-x64
3Prefetch/U...8E9.pf
windows7-x64
3Prefetch/U...8E9.pf
windows10-2004-x64
3Prefetch/U...AEB.pf
windows7-x64
3Prefetch/U...AEB.pf
windows10-2004-x64
3Prefetch/U...ADF.pf
windows7-x64
3Prefetch/U...ADF.pf
windows10-2004-x64
3Prefetch/V...D8E.pf
windows7-x64
3Prefetch/V...D8E.pf
windows10-2004-x64
3Prefetch/V...BF2.pf
windows7-x64
3Prefetch/V...BF2.pf
windows10-2004-x64
3Prefetch/V...52A.pf
windows7-x64
3Prefetch/V...52A.pf
windows10-2004-x64
3Prefetch/V...D16.pf
windows7-x64
3Prefetch/V...D16.pf
windows10-2004-x64
3Resubmissions
25-03-2024 21:05
240325-zxdnnahe48 325-03-2024 20:59
240325-zswcxahd77 325-03-2024 20:56
240325-zq3dfahd45 325-03-2024 20:51
240325-zm6xfshc96 325-03-2024 20:45
240325-zj6ghsca7s 325-03-2024 20:38
240325-zezs6shb67 325-03-2024 20:36
240325-zdscpshb45 3Analysis
-
max time kernel
49s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-03-2024 20:59
Static task
static1
Behavioral task
behavioral1
Sample
Prefetch/TRUSTEDINSTALLER.EXE-766EFF52.pf
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
Prefetch/TRUSTEDINSTALLER.EXE-766EFF52.pf
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Prefetch/TVSU.EXE-8F40E663.pf
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Prefetch/TVSU.EXE-8F40E663.pf
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Prefetch/TVSUKERNEL.EXE-F0367088.pf
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Prefetch/TVSUKERNEL.EXE-F0367088.pf
Resource
win10v2004-20240319-en
Behavioral task
behavioral7
Sample
Prefetch/UACSDK.EXE-49ECDFF8.pf
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Prefetch/UACSDK.EXE-49ECDFF8.pf
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
Prefetch/UNCSETTING.EXE-1EA31F7D.pf
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Prefetch/UNCSETTING.EXE-1EA31F7D.pf
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
Prefetch/UNINS000.EXE-1FD81499.pf
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
Prefetch/UNINS000.EXE-1FD81499.pf
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
Prefetch/UNINS000.EXE-96BE8F9A.pf
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Prefetch/UNINS000.EXE-96BE8F9A.pf
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
Prefetch/UNINSTALLFB.EXE-E48BF053.pf
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
Prefetch/UNINSTALLFB.EXE-E48BF053.pf
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
Prefetch/UNIVERSALADBDRIVERINSTALLER.E-B475736B.pf
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Prefetch/UNIVERSALADBDRIVERINSTALLER.E-B475736B.pf
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
Prefetch/UN_A.EXE-0C2A88E9.pf
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
Prefetch/UN_A.EXE-0C2A88E9.pf
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
Prefetch/UPFC.EXE-89D4FAEB.pf
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
Prefetch/UPFC.EXE-89D4FAEB.pf
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
Prefetch/USEROOBEBROKER.EXE-65584ADF.pf
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
Prefetch/USEROOBEBROKER.EXE-65584ADF.pf
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
Prefetch/VC_REDIST.X64.EXE-996BDD8E.pf
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
Prefetch/VC_REDIST.X64.EXE-996BDD8E.pf
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
Prefetch/VC_REDIST.X64.EXE-ABB5DBF2.pf
Resource
win7-20240319-en
Behavioral task
behavioral28
Sample
Prefetch/VC_REDIST.X64.EXE-ABB5DBF2.pf
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
Prefetch/VC_REDIST.X86.14.32.31332.0.E-F067952A.pf
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
Prefetch/VC_REDIST.X86.14.32.31332.0.E-F067952A.pf
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
Prefetch/VDS.EXE-2FCA9D16.pf
Resource
win7-20231129-en
Behavioral task
behavioral32
Sample
Prefetch/VDS.EXE-2FCA9D16.pf
Resource
win10v2004-20240226-en
General
-
Target
Prefetch/VC_REDIST.X64.EXE-996BDD8E.pf
-
Size
26KB
-
MD5
7367449e1fbb3e854c0a3f7be1c8fa9c
-
SHA1
3f43be8ee52a01281fc9e678263c62fe4a6434f0
-
SHA256
b27e77a1714b6d4ab7991ff3e049ef74818683bb78d0bb51f6d1c7b1572537c1
-
SHA512
c3a8abdfd34ef33a442cd166a69f56293d0db693fca7fb20058b9455ce93d5263e953a1edb3ed58bd42be4df4c733076931fc5427a222e7fbdab2a9996b967e3
-
SSDEEP
768:A8NLc1Nuvq+6u8GMJ1CmkJryS/yPiTV+h8qlA9Hj2Qtb6NBu:A8NLc1Nuvq+6u8GMJ1CjHjPO+
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\pf_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\pf_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\pf_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\pf_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\pf_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\pf_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.pf rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.pf\ = "pf_auto_file" rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2376 AcroRd32.exe 2376 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2952 wrote to memory of 2668 2952 cmd.exe 28 PID 2952 wrote to memory of 2668 2952 cmd.exe 28 PID 2952 wrote to memory of 2668 2952 cmd.exe 28 PID 2668 wrote to memory of 2376 2668 rundll32.exe 32 PID 2668 wrote to memory of 2376 2668 rundll32.exe 32 PID 2668 wrote to memory of 2376 2668 rundll32.exe 32 PID 2668 wrote to memory of 2376 2668 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Prefetch\VC_REDIST.X64.EXE-996BDD8E.pf1⤵
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Prefetch\VC_REDIST.X64.EXE-996BDD8E.pf2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Prefetch\VC_REDIST.X64.EXE-996BDD8E.pf"3⤵
- Suspicious use of SetWindowsHookEx
PID:2376
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5c1ae5da7cb929489a2e4b0a46da29852
SHA14e4e13ae8fe5de1894d541b4ddf2afa5de472a52
SHA256f4389b0adef6d78b404b8e558a0bdeab5dd3a51014481c3c154260c6ea673d3d
SHA51270acb896bf695a68cdf4543bb3b41384aa9cf774841d1b8648c2e7aa2799ec7259e30bf564e97f0cb6fa2d37b1a4935112dd92c033f1d01d05c2daba4bb55030