Resubmissions

19/04/2024, 10:27

240419-mg9pyaha9t 1

19/04/2024, 10:26

240419-mggzxsha2w 4

19/04/2024, 10:21

240419-mdzessfh49 3

19/04/2024, 10:20

240419-mc639age8x 4

Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19/04/2024, 10:21

General

  • Target

    195efefc3851c8c42ae872c95ce8d146/asset.meta

  • Size

    172B

  • MD5

    b25543e57c289495f7b61e81773e9514

  • SHA1

    e275782e85836f5df7a9ce6d4b10c1a1454ed052

  • SHA256

    577f72e012622410791a63af414965b030863f742de7251693bb7d43cea216f0

  • SHA512

    f34b11cfb72e42003a13c69f637d52a345cb42613f0cd891c5e9426d6187be1ca19e7620c4f95d7d59941665ed337977ce9d1adfbf0435d28b59e0ed8e6ba0c3

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\195efefc3851c8c42ae872c95ce8d146\asset.meta
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2924
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\195efefc3851c8c42ae872c95ce8d146\asset.meta
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2704
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\195efefc3851c8c42ae872c95ce8d146\asset.meta"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2876

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

          Filesize

          3KB

          MD5

          beed7a1259035e82a552b27f9fff0a07

          SHA1

          1470aa8f4aedda167783bd7b237bbeb4a460ece6

          SHA256

          378963fba2e8eeaa39f1a473a2dc6806c541aed0d2cb4771c66f3b395d80d9e9

          SHA512

          e97e193216627e2cfc1b7c128d5645aa17fd4bda47841eb5869c3de624336165d1fd722fb06df51449603558f74de39da5e570e03c0bf27c339df6a3ab597280