Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
28-03-2024 23:50
Static task
static1
Behavioral task
behavioral1
Sample
1.16.json
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1.16.json
Resource
win10v2004-20240226-en
General
-
Target
1.16.json
-
Size
288KB
-
MD5
9e7ab9e5ebd101e76b24899b8c2a6aa7
-
SHA1
f3c4aa96e12951cd2781b3e1c0e8ab82bf719cf2
-
SHA256
ae9f833a1d267824f5c55d0a233fc9e960ce383da43e219d261a8062d3af399a
-
SHA512
1cf121d02d3236fdf8ddd0d3bdb05494374dc30ea310c85f500b9a5dc3ae25de99481c83324b43e3fda8f7efa7cd03d053a1761438414c56c6103896415df020
-
SSDEEP
6144:qCYO2sPR5+SIrrvcyXbdLfoVjolqjuxHxu9JTAefnjDd/rj//WjAKgT15NVVAGOi:qCYO2sPR53IrrvcyXbdLQVjowjuxHxuN
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\json_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\json_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.json rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.json\ = "json_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\json_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\json_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\json_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\json_auto_file\ rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2576 rundll32.exe 2796 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2796 AcroRd32.exe 2796 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1660 wrote to memory of 2576 1660 cmd.exe 29 PID 1660 wrote to memory of 2576 1660 cmd.exe 29 PID 1660 wrote to memory of 2576 1660 cmd.exe 29 PID 2576 wrote to memory of 2796 2576 rundll32.exe 30 PID 2576 wrote to memory of 2796 2576 rundll32.exe 30 PID 2576 wrote to memory of 2796 2576 rundll32.exe 30 PID 2576 wrote to memory of 2796 2576 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\1.16.json1⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\1.16.json2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\1.16.json"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2796
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e7a584f4083ea10c3db0b7eb82f634f9
SHA1fb143a428648a1cf5f228df63a9961f7bf11faf5
SHA256be833faa2d9a269c829a9da5192e31a860f9f6ec0909547582389e99f9071bdc
SHA512839782efac67bcc1743388518957a7867c210c88527a1e9c2bb628f37e93974a5cdf54be84861d1090446470bf91f737cc9d894666b63467e56f35d056427a15