Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    24-04-2024 21:03

General

  • Target

    000 GM Normal.pth

  • Size

    376KB

  • MD5

    b786f758eae203bd531920c58c46d15c

  • SHA1

    ba220a563da9a0d07398c19664f6347c5869549c

  • SHA256

    18c2e3c0ed69e3b2bf19cdff71d6a404606c4ceb9185ad6ab647014d77362f85

  • SHA512

    707b9deb57c516dd209322012f731d1aab40e2f8c9794e81cc929a24f0dba2f5aa26043f6130abbf201b5fbde392db834f7babab098f88ab55064f6e3a60f995

  • SSDEEP

    192:GbBBBBvBBBBABBBBzBBBBhBBBBZBBBBEBBBBGBBBBLBBBBpBBBBMBBBBVqBBBBS4:PN1Oeb/VAC0ZfPy

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\000 GM Normal.pth"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2272
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\000 GM Normal.pth
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2676
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\000 GM Normal.pth"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    96ddf688bfebfb06c2c15cea28f91246

    SHA1

    caef12651108b74e13da0efce1f288bbad33d4c6

    SHA256

    c0d602db32e1c12de9b3e8a2db82033ec6473b69c28d53a30c32ef8fec4fe060

    SHA512

    08aa0621f9c81c096c54c9184aebfa18109b32ff966113a7c3ce59b687ed874370dac8a35501aa998dec442c88e8d9d155de9d6ade450b9b0e964fa17e0fefe7