Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 05:26
Static task
static1
Behavioral task
behavioral1
Sample
start.sh
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
start.sh
Resource
win10v2004-20240508-en
General
-
Target
start.sh
-
Size
285B
-
MD5
d482bc706b44f18c860b0713deb21eb0
-
SHA1
dffb43421cd45fc9c808c7683267f228e8a64aa7
-
SHA256
a3675de138b620568a924ecb30b08159267dbba29c9eee83aac48bdd03aef435
-
SHA512
49b1d80023e68420cf04aea064003dacbc85699677017c9bc84eea6a136a7551d1d9fdacc712a700c9bfc98289a37fff6b8a64720c523bbc573d4a1aeb63b137
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\sh_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.sh rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\sh_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\sh_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\sh_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.sh\ = "sh_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\sh_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\sh_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3024 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3024 AcroRd32.exe 3024 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2416 wrote to memory of 1944 2416 cmd.exe 29 PID 2416 wrote to memory of 1944 2416 cmd.exe 29 PID 2416 wrote to memory of 1944 2416 cmd.exe 29 PID 1944 wrote to memory of 3024 1944 rundll32.exe 30 PID 1944 wrote to memory of 3024 1944 rundll32.exe 30 PID 1944 wrote to memory of 3024 1944 rundll32.exe 30 PID 1944 wrote to memory of 3024 1944 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\start.sh1⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\start.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\start.sh"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3024
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5729cafa6c0693c08f21f73bdb6ea2cfe
SHA1dad70017eb523c8395a1c5dfbbcad199d8bd3098
SHA25622baab3f8b4dde59c7ec91581b238601c043ceaac17576259081ffde030cf7e6
SHA51291a422d7b4e03ce1d4b2aeb4be6135bcb8e411325bc7a8ccfa725b9cde5e683747db79ea66831fe2ab00a7cf751c01e25fe332cd923e6d217181481749d82287