Resubmissions

21/05/2024, 14:43

240521-r3mvhshd83 3

21/05/2024, 14:40

240521-r1yh8shd44 7

21/05/2024, 14:37

240521-ry949ahe2z 7

21/05/2024, 14:34

240521-rxpf6ahd6w 3

21/05/2024, 14:31

240521-rvybaahb79 7

Analysis

  • max time kernel
    18s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    21/05/2024, 14:43

General

  • Target

    Some Problems/Copy of N2gLERBrZSukjqoGdJMFsYWzD0kSH7RJiZyTC9tTdumuh5BLGhRopffhggyP_QVm9w==.c9r

  • Size

    91KB

  • MD5

    ddc43783e987e20efd139954afafbccc

  • SHA1

    efa997aee41f958768d388bef833e1255e08933b

  • SHA256

    2abe24bc70a7782ed2375de1ab7e64185b44c7d14b5afa8cc45ac00c6e583cb4

  • SHA512

    40e1e70d0bdca2aa61d1f5f5bfe5a8cdc84303ac6f18ec5121ec65c0be826d47ec1ac53fa21498def5c8183c62c007d272a7e568fb4d5c291a8c36d128c0a97c

  • SSDEEP

    1536:UBIWsK9d9AtF5PCPRl70HF0kUe+3+cDQATNBpwzch1ccihLUqMHhTv:UB/PA5gWUeZcDzBpwctu10Tv

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Some Problems\Copy of N2gLERBrZSukjqoGdJMFsYWzD0kSH7RJiZyTC9tTdumuh5BLGhRopffhggyP_QVm9w==.c9r"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1868
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Some Problems\Copy of N2gLERBrZSukjqoGdJMFsYWzD0kSH7RJiZyTC9tTdumuh5BLGhRopffhggyP_QVm9w==.c9r
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2664
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Some Problems\Copy of N2gLERBrZSukjqoGdJMFsYWzD0kSH7RJiZyTC9tTdumuh5BLGhRopffhggyP_QVm9w==.c9r"
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    d2d122a4945422fa3ded2329c31da6cb

    SHA1

    8c533c05d3c77483aa128c17a510dbeca6d6b693

    SHA256

    ae44af485576d7ce46cc5e34785d681b77368bd1da2686cdc85e241391aab95e

    SHA512

    03ef29e1a4e78799d37f7d7072d4a8a04af8cd7fe6b02e8113a0447ac1c9242031511e90a02210c2d00075a43e14f92403ab2d7701ad3b9bb5a1efeaf4c5a8ce