Overview
overview
3Static
static
1htdocs.rar
windows7-x64
3htdocs.rar
windows10-2004-x64
3htdocs/.htaccess
windows7-x64
3htdocs/.htaccess
windows10-2004-x64
3htdocs/index.php
windows7-x64
3htdocs/index.php
windows10-2004-x64
3htdocs/log/api.php
windows7-x64
3htdocs/log/api.php
windows10-2004-x64
3htdocs/log...ex.php
windows7-x64
3htdocs/log...ex.php
windows10-2004-x64
3htdocs/log...ex.php
windows7-x64
3htdocs/log...ex.php
windows10-2004-x64
3htdocs/log/index.php
windows7-x64
3htdocs/log/index.php
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01-05-2024 21:40
Static task
static1
Behavioral task
behavioral1
Sample
htdocs.rar
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
htdocs.rar
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
htdocs/.htaccess
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
htdocs/.htaccess
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
htdocs/index.php
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
htdocs/index.php
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
htdocs/log/api.php
Resource
win7-20240419-en
Behavioral task
behavioral8
Sample
htdocs/log/api.php
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
htdocs/log/api/list/index.php
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
htdocs/log/api/list/index.php
Resource
win10v2004-20240419-en
Behavioral task
behavioral11
Sample
htdocs/log/api/login/index.php
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
htdocs/log/api/login/index.php
Resource
win10v2004-20240419-en
Behavioral task
behavioral13
Sample
htdocs/log/index.php
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
htdocs/log/index.php
Resource
win10v2004-20240419-en
General
-
Target
htdocs/log/api/list/index.php
-
Size
11B
-
MD5
32c01ba72925465a3a437f41ffb9e4ee
-
SHA1
b8e5ddd01be5cc79838e5d809ccd42bd41276df8
-
SHA256
5b144011d26d28edfd21a232b9cf78e1d6bc4f20c3e348dc64debcaacce87b01
-
SHA512
9cd663b752291dea3113b03b554410accfb20577f15c95255d81b85d62a70439119b1bdb23dc715635c1e3c9599b1726e1f2832ee236d40c428db72d66fd67ab
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\php_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\.php\ = "php_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\php_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\php_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\php_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\php_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\.php rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\php_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2656 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2656 AcroRd32.exe 2656 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 112 wrote to memory of 2588 112 cmd.exe 29 PID 112 wrote to memory of 2588 112 cmd.exe 29 PID 112 wrote to memory of 2588 112 cmd.exe 29 PID 2588 wrote to memory of 2656 2588 rundll32.exe 30 PID 2588 wrote to memory of 2656 2588 rundll32.exe 30 PID 2588 wrote to memory of 2656 2588 rundll32.exe 30 PID 2588 wrote to memory of 2656 2588 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\htdocs\log\api\list\index.php1⤵
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\htdocs\log\api\list\index.php2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\htdocs\log\api\list\index.php"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2656
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b881bf58c866417be751189848d38cde
SHA1c11d5cd4bf5e7387b73fa7344d54d516fa6aedfa
SHA256e227cdd4dd66cb4d81d002b2a789a70316173ba1fbfe4bea3b2867a766839948
SHA512df019ff8a9449ab733872ca7db7144512b8724ab3cb39d198065a31d612ad3cf7e88999db7a2830916e33ac3aa447959f8da188e57dadc840d974dccc376136d