Analysis

  • max time kernel
    119s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    01-05-2024 23:53

General

  • Target

    e5953af7cf24bd0896a43e962331e0b6a41638ff252d68a91750ba9e5ee0f5b7.dex

  • Size

    79.0MB

  • MD5

    ce99383631ceeea8a49f59b2f61c4001

  • SHA1

    492de633813fa1fd1f261948b0ea683b335ec616

  • SHA256

    e5953af7cf24bd0896a43e962331e0b6a41638ff252d68a91750ba9e5ee0f5b7

  • SHA512

    d23571d1e63bee0517c807eb8f25dcfb1ed53f74c2d004af3bb753141c0118e22c1e49e7e5b9ff411b6bae9aa38095bab5221a3d42749dbe801495fa6db38cd6

  • SSDEEP

    393216:69AsW8Iz4fPn9c0aueeBi1JN7M2UuqkCFk5hR+/L4+7osQq8175f1/dbR4p6Pvn7:69Ap8gqn9TaaqJlMRFkfRaosQN55RrVj

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\e5953af7cf24bd0896a43e962331e0b6a41638ff252d68a91750ba9e5ee0f5b7.dex
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\e5953af7cf24bd0896a43e962331e0b6a41638ff252d68a91750ba9e5ee0f5b7.dex
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2756
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\e5953af7cf24bd0896a43e962331e0b6a41638ff252d68a91750ba9e5ee0f5b7.dex"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    75714ab6c5e62453d1779073e943e3a7

    SHA1

    07d4fd53a363e848bc3bd403897beca35e0c6a8f

    SHA256

    c69ec36e486734466455a81a2479cba95c5b20b51ac64706d88bf6a5171992dc

    SHA512

    b8ed9326a3dd7065653a02dd778894823fb60948bed9155165a4a25b48c63634fc720f836e85e0c332b8374558d016f1e4b9eb11456751f157c5cd22dfc2700f