Analysis

  • max time kernel
    104s
  • max time network
    66s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13/04/2024, 01:05

General

  • Target

    Malware-Feed-master/2020.07.27_CISA-Legacy_Malware_Targeting_QNAP_NAS/README.md

  • Size

    47B

  • MD5

    1a520aff858573e768ad77c5f61d4c25

  • SHA1

    88332c9edbd3561307f79f79a4c22414fdc1f369

  • SHA256

    66cd4b7d78465c16e710e3b8720f0700f2bb557d9feebce07033406b77bb942d

  • SHA512

    79a15c238b518a9903a8a7c070c9632298f81d2c85898c8f6c637bfabfd44abb513d68e6ba061f9ad102123ff951b85cb44d369723507f9193d02ae6c321fc69

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Malware-Feed-master\2020.07.27_CISA-Legacy_Malware_Targeting_QNAP_NAS\README.md
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2748
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Malware-Feed-master\2020.07.27_CISA-Legacy_Malware_Targeting_QNAP_NAS\README.md
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2500
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Malware-Feed-master\2020.07.27_CISA-Legacy_Malware_Targeting_QNAP_NAS\README.md"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    07284fdeaef161bb2dc29c48f1a5b3ca

    SHA1

    0cf2bb71dd3085365b51ab86ef3b6a239c2dc626

    SHA256

    e55b6c7598cd977a70a3df06e3ef1edacf0cdde4079d5a80fe9dffd309b7d6f6

    SHA512

    ccc68f531f2f7b9d00c13d03d64392bdce466fde954a0161687350310ec25d5f7f3fffe5dd24cc5331445b2ae111e7421bfb41f8b09110886278a29d80d3ed5c