Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 12:13
Static task
static1
Behavioral task
behavioral1
Sample
newVersion.sh
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
newVersion.sh
Resource
win10v2004-20240508-en
General
-
Target
newVersion.sh
-
Size
149B
-
MD5
47d846f4a3d4bbae55d5b88886c30e41
-
SHA1
ee0842aa25a322df593a7623bbfc14935d826c33
-
SHA256
fefb53aae98138a4549a0eb65a50c9fff4264c39407df62f39576db004fbc42e
-
SHA512
c51ae9ad3a79fd2d2f2c1d4ba8faa3f7d0e93b06d906e48ff99d56e2936573e6d04dcf6cba00fc1c9f20f762cd2c171493facd3542e8149f77901157ccd5c638
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\sh_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\sh_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\sh_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.sh rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.sh\ = "sh_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\sh_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\sh_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\sh_auto_file\ rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2688 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2688 AcroRd32.exe 2688 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2636 2188 cmd.exe 29 PID 2188 wrote to memory of 2636 2188 cmd.exe 29 PID 2188 wrote to memory of 2636 2188 cmd.exe 29 PID 2636 wrote to memory of 2688 2636 rundll32.exe 30 PID 2636 wrote to memory of 2688 2636 rundll32.exe 30 PID 2636 wrote to memory of 2688 2636 rundll32.exe 30 PID 2636 wrote to memory of 2688 2636 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\newVersion.sh1⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\newVersion.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\newVersion.sh"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2688
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD537a1bb10c774663e4f504e77458b0a63
SHA15e5525a6535a321d6e693c41a91cf2e74cb738ff
SHA25689ac5aa19a0617e0c8751be0df95bf0dc87fad1237b9f570fd8ad52fa4e15974
SHA5122d133aaccccedd7fdb0ebb89749b698d0946098255f0bc73cd574f85e63bcbba7e0b52302a212a8137c670de119bd73ac2f192008207f5a017d2acf17b15d380