Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    28-04-2024 20:32

General

  • Target

    data/flutter_assets/AssetManifest.json

  • Size

    807B

  • MD5

    08a8cb061f1ee7b2f890433b058a6c05

  • SHA1

    315a7d58fd6b7a6c6691fde9a81bac5a5ef07af5

  • SHA256

    60d741d8280042fdccc4f3bf311106f9d2df7ff3a730660e9049795ebe82e9d6

  • SHA512

    11d822976fa9280f305fd3e108fcaa725483e26e6fe86e395df9f6212f16eb6b08ebd849ab168e3d1f6c731723c2a41678fa6da764a24c6a6e46a02b39bc2190

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\data\flutter_assets\AssetManifest.json
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2880
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\data\flutter_assets\AssetManifest.json
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2408
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\data\flutter_assets\AssetManifest.json"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2744

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents
    Filesize

    3KB

    MD5

    f42af73abda0dfc5dbd71e9707a93ca2

    SHA1

    58bd613b34d164452c766d2115a1980d936531bc

    SHA256

    f61599bb12588712a38e4bcfa02bda972148af810540241c1f07a38a86d9b340

    SHA512

    166516405e2629db22fb356281e2d86b5edecc78d4d86b09da99d5b2bc2a6738f00eec4c0c841ebea730376cdd468737545d024359b0d830e22f8d300e424e0e