Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 05:42
Static task
static1
Behavioral task
behavioral1
Sample
test_dump_dailyfile.sh
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
test_dump_dailyfile.sh
Resource
win10v2004-20240508-en
General
-
Target
test_dump_dailyfile.sh
-
Size
1KB
-
MD5
93d79774f26ddeacdaa476964647fa9c
-
SHA1
4510583d65f47b452f7a2f776fd4ac0c7591a0b8
-
SHA256
4dfe5767d0253a6760cfc061d72803a30b9ea00400b6315f7dd1468661970261
-
SHA512
c7e2f794985da7c796d416f7703ff0cfca438669e0409d4348cc21dffa010e0fc165fe38ac3a044181afc437dc813c4d44a3e3b533c6b7115c0227fe0be181e8
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\sh_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\sh_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\sh_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\sh_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.sh rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.sh\ = "sh_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\sh_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\sh_auto_file rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2788 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2788 AcroRd32.exe 2788 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2284 wrote to memory of 2516 2284 cmd.exe 29 PID 2284 wrote to memory of 2516 2284 cmd.exe 29 PID 2284 wrote to memory of 2516 2284 cmd.exe 29 PID 2516 wrote to memory of 2788 2516 rundll32.exe 30 PID 2516 wrote to memory of 2788 2516 rundll32.exe 30 PID 2516 wrote to memory of 2788 2516 rundll32.exe 30 PID 2516 wrote to memory of 2788 2516 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\test_dump_dailyfile.sh1⤵
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\test_dump_dailyfile.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\test_dump_dailyfile.sh"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2788
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a1991d0ded532e1f534bbe71922001f8
SHA108fa167e09bf9cf9c11f69821091c6201c70e705
SHA256416436ced5319681537637437fb371a3d57df6db219595bf18e703d5e4bb50bc
SHA51287afb452962944f8ac9aea55f0433a6bb7b808ff3e54691b7302ceb7a4102e6bd366faa95e78300cd6d0b3c0bb00c01a8234b4a178684804c690f0127e83ddb3