Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    22/05/2024, 11:53

General

  • Target

    f_all.sh

  • Size

    126B

  • MD5

    16982e3da51fabc83141e849271b6153

  • SHA1

    c35e2d1cb8cc013d704c03d34525023ad9c32668

  • SHA256

    ed1a825ece284b08ac36e1b4f65c9341e96ba777903d1651a39a450d557770a9

  • SHA512

    47d271155aef8cea86a60e498dded9575a8210a90896b55b7b71d88ad0d42b99dc26b66b1d4fc711be3a7a3cb272fd80faa4dd13bea9ec27601a2f997b68cd4b

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\f_all.sh
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1868
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\f_all.sh
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2732
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\f_all.sh"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2816

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

          Filesize

          3KB

          MD5

          d91ee18328025a6b48bd7cc1a5ce0919

          SHA1

          5c1a154aabebab6ea0bafae63269578db880994c

          SHA256

          b2818b416f823428ee314ed772917e61cd6e596c2a97967cb1e5086e80e773c9

          SHA512

          38d94c069dbe906e8bc31b08ba829e9ffc0123bef4c623bbe2bfb4bdeba18edb0b38800dc1913cf0cfd2fe4c70d13679f698770dbdf6e393f8bc1d1c0f981512