Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    27/04/2024, 22:03

General

  • Target

    pack.mcmeta

  • Size

    101B

  • MD5

    674a30f4aae52a96d14ef2fbc69e3d83

  • SHA1

    696aecc21c10eae2f56d31d051f9df31cbd3a6dc

  • SHA256

    0818a4d5d24c39fd8ec7293a7023b9e71ec5b55012a8a132c286394aa3a58291

  • SHA512

    9448f3c9982d60264ba3d11ec661c9d5d7486656aced806351c86213cb4e82f66e41e1b06f97df70eff374946fb10488aeffda272e35c888dedc5ae513a4f9d4

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\pack.mcmeta
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2860
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\pack.mcmeta
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2616
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\pack.mcmeta"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    2352406cb1b29c037e33704afb5098e2

    SHA1

    1028e7d5a6ce004bc5922eebeac6b5a3e7305b47

    SHA256

    f5b8dc6273da3aef1dca3e059c6de007063bd2d3cdd348e3513d90c602f6fa90

    SHA512

    95fd4a8233075b7f5af0b7bbd755db38bcfdde419b1462e9640680366ddd6eb62ed745175d48b491e34fcb52e9cc3be92c43cb9627ea6f5bd48ee0cf0524ec53