Overview
overview
3Static
static
1CVE-2023-3...sample
windows7-x64
3CVE-2023-3...sample
windows7-x64
3CVE-2023-3...sample
windows7-x64
3CVE-2023-3...sample
windows7-x64
3CVE-2023-3...sample
windows7-x64
3CVE-2023-3...sample
windows7-x64
3CVE-2023-3...sample
windows7-x64
3CVE-2023-3...sample
windows7-x64
3CVE-2023-3...sample
windows7-x64
3CVE-2023-3...sample
windows7-x64
3CVE-2023-3...sample
windows7-x64
3CVE-2023-3...sample
windows7-x64
3CVE-2023-3...sample
windows7-x64
3CVE-2023-3...oit.py
windows7-x64
3CVE-2023-3...pt.bat
windows7-x64
1Analysis
-
max time kernel
48s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 08:59
Static task
static1
Behavioral task
behavioral1
Sample
CVE-2023-38831/.git/hooks/applypatch-msg.sample
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
CVE-2023-38831/.git/hooks/commit-msg.sample
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
CVE-2023-38831/.git/hooks/fsmonitor-watchman.sample
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
CVE-2023-38831/.git/hooks/post-update.sample
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
CVE-2023-38831/.git/hooks/pre-applypatch.sample
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
CVE-2023-38831/.git/hooks/pre-commit.sample
Resource
win7-20240221-en
Behavioral task
behavioral7
Sample
CVE-2023-38831/.git/hooks/pre-merge-commit.sample
Resource
win7-20240419-en
Behavioral task
behavioral8
Sample
CVE-2023-38831/.git/hooks/pre-push.sample
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
CVE-2023-38831/.git/hooks/pre-rebase.sample
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
CVE-2023-38831/.git/hooks/pre-receive.sample
Resource
win7-20240221-en
Behavioral task
behavioral11
Sample
CVE-2023-38831/.git/hooks/prepare-commit-msg.sample
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
CVE-2023-38831/.git/hooks/push-to-checkout.sample
Resource
win7-20240419-en
Behavioral task
behavioral13
Sample
CVE-2023-38831/.git/hooks/update.sample
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
CVE-2023-38831/exploit.py
Resource
win7-20240221-en
Behavioral task
behavioral15
Sample
CVE-2023-38831/script.bat
Resource
win7-20240220-en
General
-
Target
CVE-2023-38831/.git/hooks/fsmonitor-watchman.sample
-
Size
4KB
-
MD5
a0b2633a2c8e97501610bd3f73da66fc
-
SHA1
0ec0ec9ac11111433d17ea79e0ae8cec650dcfa4
-
SHA256
e0549964e93897b519bd8e333c037e51fff0f88ba13e086a331592bf801fa1d0
-
SHA512
5168643c1768ec83554a9066754507a781b6d14251a46a469222d462efc6ca87a72c90679154e8a723349c91e7772b32ac9b08dfe313cded0ee0a6f17885079e
-
SSDEEP
96:GFCscBOvOFXDgRvi/3UCwN4ZlkRo/j5SpoNOBoi+geBIzCa:GFCsEOmWRa8CwN4ZqRo7geEk3IzCa
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\sample_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.sample\ = "sample_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\sample_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\sample_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\sample_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.sample rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\sample_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\sample_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2704 AcroRd32.exe 2704 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 1652 wrote to memory of 3028 1652 cmd.exe rundll32.exe PID 1652 wrote to memory of 3028 1652 cmd.exe rundll32.exe PID 1652 wrote to memory of 3028 1652 cmd.exe rundll32.exe PID 3028 wrote to memory of 2704 3028 rundll32.exe AcroRd32.exe PID 3028 wrote to memory of 2704 3028 rundll32.exe AcroRd32.exe PID 3028 wrote to memory of 2704 3028 rundll32.exe AcroRd32.exe PID 3028 wrote to memory of 2704 3028 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\CVE-2023-38831\.git\hooks\fsmonitor-watchman.sample1⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\CVE-2023-38831\.git\hooks\fsmonitor-watchman.sample2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\CVE-2023-38831\.git\hooks\fsmonitor-watchman.sample"3⤵
- Suspicious use of SetWindowsHookEx
PID:2704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEventsFilesize
3KB
MD5c1d0831a672eb9e5f9bcee13d3e4b4a6
SHA1821b3fdb705240333681f6b3dee66794f31b9731
SHA2569b5fa6e9c2aa97a3d41e7b74a2df4c0fa7b7874ebde80db77ff0886594e2ccfd
SHA512c7f5de1658008d541db662343e8ceca199dd9a1fba937bd57a2b6d54630fbe5f23313ef6d5e6f34ec48c13a8427a6f1f4e317773ca7b84d49768f3551d6b7fe3