Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 08:14
Behavioral task
behavioral1
Sample
СчетФактура.rar
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
СчетФактура.rar
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
СчетФактура.pdf
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
СчетФактура.pdf
Resource
win10v2004-20240508-en
General
-
Target
СчетФактура.rar
-
Size
49KB
-
MD5
94f51bbd83ac8f1121683e6660ec85ba
-
SHA1
7a171ee5a3515ea73f8bef051a8c02a5b96449bf
-
SHA256
e18f524be752b094f7ed09524e3ccaef2eaf87759bc6c84ed9e3b9418fe33d07
-
SHA512
bc694bfe8e62c79bf4bda4b6e3f14101f1508f7084e39f8eb31e66d73be9bf29cdc6fa47d530c13bb33220d92c5a9759432c6576c789df74748b9a1334376e98
-
SSDEEP
1536:91Ss6ZTFN3VXVMqC9HZlENHCoKVFllNfSpk:9UsCTjMnHZlEgLfSpk
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
rundll32.exepid process 2668 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1644 wrote to memory of 2668 1644 cmd.exe rundll32.exe PID 1644 wrote to memory of 2668 1644 cmd.exe rundll32.exe PID 1644 wrote to memory of 2668 1644 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\СчетФактура.rar1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\СчетФактура.rar2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam