Analysis
-
max time kernel
122s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 04:53
Static task
static1
Behavioral task
behavioral1
Sample
9a8b0ebe7b18da6e638fdc9f7e1353c56a561419b12932aff6b0a42a7fe6ac12.zip
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
9a8b0ebe7b18da6e638fdc9f7e1353c56a561419b12932aff6b0a42a7fe6ac12.zip
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Autoit3.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Autoit3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
script.a3x
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
script.a3x
Resource
win10v2004-20240508-en
General
-
Target
script.a3x
-
Size
548KB
-
MD5
404bd47f17d482e139e64d0106b8888d
-
SHA1
bd96c024dcba4fda4e3c9aa9dfcc03f37d072cc7
-
SHA256
0116d3f7e5ecafaf572141a6eaf3bffa80ff04519872be77f07f4b284272db5d
-
SHA512
fafe9fd532290b50135a5e18ac52590d99652027cefc016606105ddb4758d0db74a722894a9be9ff1a89d70cd08deb53eac1c47213b38911a1744aecb0d92c05
-
SSDEEP
12288:5ORwcZ/qOKfCMMF3WDbmYMfmGI5/MjyLiy6U9TDh:ouehh2bFMfy5TdTDh
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\a3x_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\.a3x\ = "a3x_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\a3x_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\a3x_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\a3x_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\a3x_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\a3x_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\.a3x rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2648 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2648 AcroRd32.exe 2648 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2432 wrote to memory of 2728 2432 cmd.exe rundll32.exe PID 2432 wrote to memory of 2728 2432 cmd.exe rundll32.exe PID 2432 wrote to memory of 2728 2432 cmd.exe rundll32.exe PID 2728 wrote to memory of 2648 2728 rundll32.exe AcroRd32.exe PID 2728 wrote to memory of 2648 2728 rundll32.exe AcroRd32.exe PID 2728 wrote to memory of 2648 2728 rundll32.exe AcroRd32.exe PID 2728 wrote to memory of 2648 2728 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\script.a3x1⤵
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\script.a3x2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\script.a3x"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD502795e109f18fc676d49ff937e0e0464
SHA1375f93da04514dd38863c34cd26556cc3c43cd57
SHA2566e93671e5a7a3bf8fa51049568162b3467ec86075a761528d2500289775551b2
SHA5127fc3e6140a21ec49ad1010569c240a0da3a30e3ba2bb81c824d9c8c52ecdbb0b1f836c459073690d23cd4ae3654968c2992f4673208bf4a042706cc69f73c727