Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 11:53
Static task
static1
Behavioral task
behavioral1
Sample
f_all.sh
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
f_all.sh
Resource
win10v2004-20240508-en
General
-
Target
f_all.sh
-
Size
126B
-
MD5
16982e3da51fabc83141e849271b6153
-
SHA1
c35e2d1cb8cc013d704c03d34525023ad9c32668
-
SHA256
ed1a825ece284b08ac36e1b4f65c9341e96ba777903d1651a39a450d557770a9
-
SHA512
47d271155aef8cea86a60e498dded9575a8210a90896b55b7b71d88ad0d42b99dc26b66b1d4fc711be3a7a3cb272fd80faa4dd13bea9ec27601a2f997b68cd4b
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\sh_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\.sh rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\.sh\ = "sh_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\sh_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\sh_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\sh_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\sh_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\sh_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2816 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2816 AcroRd32.exe 2816 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1868 wrote to memory of 2732 1868 cmd.exe 29 PID 1868 wrote to memory of 2732 1868 cmd.exe 29 PID 1868 wrote to memory of 2732 1868 cmd.exe 29 PID 2732 wrote to memory of 2816 2732 rundll32.exe 30 PID 2732 wrote to memory of 2816 2732 rundll32.exe 30 PID 2732 wrote to memory of 2816 2732 rundll32.exe 30 PID 2732 wrote to memory of 2816 2732 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\f_all.sh1⤵
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\f_all.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\f_all.sh"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2816
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d91ee18328025a6b48bd7cc1a5ce0919
SHA15c1a154aabebab6ea0bafae63269578db880994c
SHA256b2818b416f823428ee314ed772917e61cd6e596c2a97967cb1e5086e80e773c9
SHA51238d94c069dbe906e8bc31b08ba829e9ffc0123bef4c623bbe2bfb4bdeba18edb0b38800dc1913cf0cfd2fe4c70d13679f698770dbdf6e393f8bc1d1c0f981512