Analysis

  • max time kernel
    38s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2024, 17:37

General

  • Target

    McDonnell Douglas MD-80/objects/prefill.obj

  • Size

    320KB

  • MD5

    c7123d7deac715227f0cf4cabc8682ef

  • SHA1

    cdb9c93c87961817393400401ec705750bc52b32

  • SHA256

    267d71c9e0edb1e8b9e6b40e887de80f5ca2007995e650f531b45b1f3211fb63

  • SHA512

    40941bb9f95e9e0c06668fafa39013b413aa28b3facf91c4002371de58cee3826f7f72e5e4397c944d1e64a5fb4e9c2718bffaaa5cbc5879ceaa99b554ea0c91

  • SSDEEP

    1536:Pz6X/3RnDR3riWc5iAU8Q0uq+HDu8xeXPQ9dJpfDC4kQigyaB1PGoveFYO5O2m4k:S3eb/XofSr3YO5zm3LQWXGg

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\McDonnell Douglas MD-80\objects\prefill.obj"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\McDonnell Douglas MD-80\objects\prefill.obj
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2484
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\McDonnell Douglas MD-80\objects\prefill.obj"
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2716

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

          Filesize

          3KB

          MD5

          b2e05ad3dabb0374c086f48806678f15

          SHA1

          15ebc3b3ed508a97f5667ab11102aab2fd2415ef

          SHA256

          3a1e2fcd6606aaeb062cfced63129b3885c53ef58e96852fa7ea89d58a64cf28

          SHA512

          fa3fccea7751332f568f4d4f96ef30ec5e7ab355f5e1e6c1ca8f2b091df2c8d0fb117c9999c0be87e42954e116242a1274b5739a8bcea17761f5299c0017ff31