Resubmissions

21/05/2024, 00:50

240521-a7ax3sdb7s 4

21/05/2024, 00:49

240521-a6nsjsdb5s 1

Analysis

  • max time kernel
    1563s
  • max time network
    1566s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    21/05/2024, 00:50

General

  • Target

    pagefile.7z

  • Size

    79.4MB

  • MD5

    ecda4d60df1dd5a867f94f75076103ea

  • SHA1

    e9e4c67cd80950f418e17ccecf699ba3e70b9201

  • SHA256

    b4b96e61980599af727294cc05e85675e789f872b5c42346096f422c118de084

  • SHA512

    f2f9f34158966a42e8ced2684c8febfb72973636d2e662fa4b80c2c2edec51cb0285e7a0f097fb38d8adbce2fb6b718d09a0ee015c5875d369783570a3d07133

  • SSDEEP

    1572864:3qzvGjsfKKocul6DRJMawJIjK6QD//fB4cGLlR8v7qFrohUxt:30vA8KKo36DMbF603fBzKm7qFP

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\pagefile.7z
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\pagefile.7z
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2724
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\pagefile.7z
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2688
        • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
          "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\pagefile.7z"
          4⤵
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    dff4016d1ad02e7ba6d74d131a9600b4

    SHA1

    3dac05fc0353576da77c3699b1f879205705e251

    SHA256

    31d696ae66dadb8036f8cc4ebeed779704cc7a600129861c6a932d76940cc0aa

    SHA512

    a2b6f68216e49e4e766b1b1c7152bc05c8756416d625c51a0228a88b7a6ebcfb9fb355cc98d4005d49d6a331271e620adff3b729bb90ae362325d4b185cefa7b