Analysis

  • max time kernel
    119s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13-04-2024 01:05

General

  • Target

    Malware-Feed-master/2020.08.26_CISA-North_Korean_RAT_ECCENTRICBANDWAGON/README.md

  • Size

    57B

  • MD5

    0d103d48c25db669e6c2a60c6d00f755

  • SHA1

    59b102919b1f1e2170cbe1e01133f5bb3eb85e75

  • SHA256

    02f4920a8920ce63f81794307420430419349050d34b304c5168cbba41138ae6

  • SHA512

    7eb68c452c152de06f117eac85bbb18e675867eae515559628de285ca1bb646bd9a7c2b9306ab2bda42792a3364a72fb2ceed3b6bcc13cc386f16e15edd2e191

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Malware-Feed-master\2020.08.26_CISA-North_Korean_RAT_ECCENTRICBANDWAGON\README.md
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Malware-Feed-master\2020.08.26_CISA-North_Korean_RAT_ECCENTRICBANDWAGON\README.md
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2660
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Malware-Feed-master\2020.08.26_CISA-North_Korean_RAT_ECCENTRICBANDWAGON\README.md"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    1a411472d2436a375dda5f2a9aafd966

    SHA1

    420e810001289b53a20256a4fe3edf53e817aa65

    SHA256

    2979f08eda428dfbd6d8f220c9f6e2f6930dd6ff44193e751ba35d4377e43d49

    SHA512

    5fb1b736aeabf8c168c47d6e5a39648830d8476b9d5cb98324290bc0315fa428afade00f271f2d9e0cb0bb3a11e86534bbfb70cf183c1fac6791985b9e076de1