Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 20:55
Static task
static1
Behavioral task
behavioral1
Sample
auto.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
auto.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
b.a3x
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
b.a3x
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
c.a3x
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
c.a3x
Resource
win10v2004-20240508-en
General
-
Target
b.a3x
-
Size
23KB
-
MD5
798143857b58ea9146d2e58b5f21c25e
-
SHA1
2bd4acea5c3bf107cc6615af65d1617c847814cc
-
SHA256
c3d85c05121900c93f667ff65073ef331d37e65eea9bd4c60252dba9764056a3
-
SHA512
446cedc6dcd277ee542d157f7f5a4c0f305a6aceb317ad518c6d6f15843cd525c1e52502330de494664a868f5904db164a0570bb3ff756b5e8b059a32c379b08
-
SSDEEP
384:M3//cBozUqKi8DsHqjFnKNSTYY0Rez/5QLkWN6vXiAq+7UYaiaeOaIfxVh+bJ/jd:U//vUqKFsKw0h1QL7Qvy8UYP6aIfxVgP
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\a3x_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\a3x_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.a3x rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.a3x\ = "a3x_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\a3x_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\a3x_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\a3x_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\a3x_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2112 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2112 AcroRd32.exe 2112 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 1908 wrote to memory of 2616 1908 cmd.exe rundll32.exe PID 1908 wrote to memory of 2616 1908 cmd.exe rundll32.exe PID 1908 wrote to memory of 2616 1908 cmd.exe rundll32.exe PID 2616 wrote to memory of 2112 2616 rundll32.exe AcroRd32.exe PID 2616 wrote to memory of 2112 2616 rundll32.exe AcroRd32.exe PID 2616 wrote to memory of 2112 2616 rundll32.exe AcroRd32.exe PID 2616 wrote to memory of 2112 2616 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\b.a3x1⤵
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\b.a3x2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\b.a3x"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53dd401b4c440ee2c2f8283db790e0d5b
SHA1acc925ed797b04e182951615c8ed0569720d048b
SHA2565488cfaf4c36e4f773e6f0caa02f6e0592d0861edeee99a2f82ea19def23b3bf
SHA512a76051c911d609cf5671e9667be691b6425b720eff4ab86a0b5957e036ef8ef9d4a55c70829b67c858bb659b58c701c278f712a85d78b3993532569518781eb6