Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    27-04-2024 19:43

General

  • Target

    Justice.League.S03.1080p.BluRay.x264-SPRiNTER/Justice League - 03x08 [BluRay][x264][1080p].srt

  • Size

    14KB

  • MD5

    b785655470df76ff46ad3771c6629b0d

  • SHA1

    8aceaae840c9b29130b34e1b4de27c2013428d39

  • SHA256

    ecd5a8e3b84dc6b128ff2ce19cf6d1d6e738fb83a90fdb17173c070a4a03678b

  • SHA512

    409e27b708b67a80e2c0077d198f3e5a949b0fd2288ce82e7489211163213d5da8ee10b22541289585647dd91b76a2520d573f9a43995a39f7d77cf7d991aed9

  • SSDEEP

    384:FRnegVoeKWHZm0r75avbuPTvGpjF8rIm7:He+oeKW5ma75ZCjlm7

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Justice.League.S03.1080p.BluRay.x264-SPRiNTER\Justice League - 03x08 [BluRay][x264][1080p].srt"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Justice.League.S03.1080p.BluRay.x264-SPRiNTER\Justice League - 03x08 [BluRay][x264][1080p].srt
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1288
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Justice.League.S03.1080p.BluRay.x264-SPRiNTER\Justice League - 03x08 [BluRay][x264][1080p].srt"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    07b8a002252a75c72d74ce0c61136def

    SHA1

    0854cb43b9cc65b5804cbe2c763874e58b6bbf92

    SHA256

    46b6ebc2e3b0c546d64c9be3189994a05b3b1aa2efe5820822914d5b262cc78e

    SHA512

    5e1897fddd809577608f10f2c3208c8517a2e00bf304d3238c77c679e72f6cb896c00310bdf7de734691f73098bcf42b2c80cd72224da845ee64986ad59bbe78