Analysis

  • max time kernel
    119s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29/04/2024, 16:57

General

  • Target

    CanLedger_Mod_Menu/CanLedger Mod Menu/scripts/OP_Recovery_V2.1.lua

  • Size

    4KB

  • MD5

    29a6c304121c75052510f6aac5cd2b50

  • SHA1

    edb0c9a06720b12ca050c6579164f7d2a97ae1f4

  • SHA256

    868115ad7570e73287fd767c6a4c1c6c5776849aaa9de0396eb6cfe9a3f55cce

  • SHA512

    c3a606a6b2e5996fab6967979b4a190e238d5d482a19858bc6eba418a2b64aa75ada0740f67582869ba3c25620c3f97d55aaccf6249a0c6285b8a513259ce2d4

  • SSDEEP

    96:+jkmQ0V2DctSILEP4mLEIpsnoacSFSiVEo+GZowSll31E3Oey7Z/A3QmjIenoLLE:GkmLiVkZELpJNgqrP+

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\CanLedger_Mod_Menu\CanLedger Mod Menu\scripts\OP_Recovery_V2.1.lua"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\CanLedger_Mod_Menu\CanLedger Mod Menu\scripts\OP_Recovery_V2.1.lua
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2604
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\CanLedger_Mod_Menu\CanLedger Mod Menu\scripts\OP_Recovery_V2.1.lua"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    7a7b811aee409307ed7a43a180a36fa2

    SHA1

    751e007dbe9ef851b6b3d1127b57812f8686a74a

    SHA256

    5181f51888b6e7528be2323c104658450334605db88dc951d2848540440dea88

    SHA512

    02d4a7ed0d1d1d2f179b7b88f7d13eaa666c23be6fb73165cc8ee6d9a4c0e0ee44c3fe31cdd984c49bc9f41feb7b5750b6f0b6cd60bbca16efa679856c02d323