Resubmissions

21-05-2024 14:43

240521-r3mvhshd83 3

21-05-2024 14:40

240521-r1yh8shd44 7

21-05-2024 14:37

240521-ry949ahe2z 7

21-05-2024 14:34

240521-rxpf6ahd6w 3

21-05-2024 14:31

240521-rvybaahb79 7

Analysis

  • max time kernel
    18s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2024 14:31

General

  • Target

    Some Problems/Copy of cqmOWAT7eBvoDJCy8wZHs0V8Ib0V3a8k4_PFoEq5b3hYpFeAISk-UHHW9V9h5CR6TA==.c9r

  • Size

    1.7MB

  • MD5

    8a32154f39da84142332817cc6344424

  • SHA1

    ff8d3348c908cb6f0c7868cdf6f683495316be0b

  • SHA256

    cfe25bc6a97eae8b49b3f95a1457fb9311b4839bd21db498852d4cc7f6a2da1a

  • SHA512

    be2b2bf38ba2c24394721025c9ad3319cb1aa32de9ca182bd43072da9e9fcc5fef1fed52fdee4c547b9d3c56e5e0648cf3dd75f0564308e4e1e114127e9360f6

  • SSDEEP

    49152:f5YfBFu436alRjbuK0LudkDUL1kzM/YDQIMn/X7rpS2Skn:f5YfBFurchbD0Ludk4uIVFSkn

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Some Problems\Copy of cqmOWAT7eBvoDJCy8wZHs0V8Ib0V3a8k4_PFoEq5b3hYpFeAISk-UHHW9V9h5CR6TA==.c9r"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Some Problems\Copy of cqmOWAT7eBvoDJCy8wZHs0V8Ib0V3a8k4_PFoEq5b3hYpFeAISk-UHHW9V9h5CR6TA==.c9r
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2780
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Some Problems\Copy of cqmOWAT7eBvoDJCy8wZHs0V8Ib0V3a8k4_PFoEq5b3hYpFeAISk-UHHW9V9h5CR6TA==.c9r"
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    e25c9ad82e73e5fc5f3f3b5a1150f517

    SHA1

    661be09ead3ba93bafa3b960494d032fa525eb27

    SHA256

    d048df25644c70aaba3059a9b7b827c3ef43cee0d4e24a6ab9be6fddf5bedced

    SHA512

    6846f689dccd3efa844ee7156620f3e4495ce8fd02f7eeafc244df93e944ac7edee0e88374305d76e2e1d2a74731aa4e3546d3fe97c73087233fd7de49aa6178