Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 09:15
Behavioral task
behavioral1
Sample
624-39-0x00000000048C0000-0x0000000004C47000-memory.dmp
Resource
win7-20240221-en
General
-
Target
624-39-0x00000000048C0000-0x0000000004C47000-memory.dmp
-
Size
3.5MB
-
MD5
77adfbd169586974c046d6fb58ef4dcd
-
SHA1
d00280ef0e885f2b52f49617928336c4fda36727
-
SHA256
9d56c1e5a1d730822fcb863807b2cd79539b09799321d101d50eb961b444148f
-
SHA512
d3d21275bf618aff73b833623e67f0f3e64fd80dca36506ac66220f54d69412cf94798263963862afb72492ea26622c7d6fb77f30c60e90debb848356dc0727b
-
SSDEEP
6144:gmFFYrx0PmfUH1YTCh+mlrDvWBaoakAI04Yd1FkMGS4GQBe:lFFYrkmfUVY8+mp3I0/ZkMnz
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\dmp_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.dmp rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.dmp\ = "dmp_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\dmp_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\dmp_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\dmp_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\dmp_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\dmp_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2592 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2592 AcroRd32.exe 2592 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2944 wrote to memory of 2588 2944 cmd.exe 29 PID 2944 wrote to memory of 2588 2944 cmd.exe 29 PID 2944 wrote to memory of 2588 2944 cmd.exe 29 PID 2588 wrote to memory of 2592 2588 rundll32.exe 30 PID 2588 wrote to memory of 2592 2588 rundll32.exe 30 PID 2588 wrote to memory of 2592 2588 rundll32.exe 30 PID 2588 wrote to memory of 2592 2588 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\624-39-0x00000000048C0000-0x0000000004C47000-memory.dmp1⤵
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\624-39-0x00000000048C0000-0x0000000004C47000-memory.dmp2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\624-39-0x00000000048C0000-0x0000000004C47000-memory.dmp"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2592
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD592373c86073ae2479fb45c0bd802a483
SHA1912c96ccd4ce075b4fa3229a66ff2b032352a1f3
SHA256128778161a95374589c939a85b6cd94287b661047684a18656fbe5a367f0f9fb
SHA5129f11da39083665c00676fc455944f3ebf521c11a45b326350accbe001cc5aea85cf349ff5edb2bd085f3192acf1589a9e30b501fc3fe2a4afd257540f17725ee