Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 12:27
Static task
static1
Behavioral task
behavioral1
Sample
update_perm.sh
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
update_perm.sh
Resource
win10v2004-20240426-en
General
-
Target
update_perm.sh
-
Size
57B
-
MD5
661f41a030fafeea654c007035a7a25a
-
SHA1
488a3d05b802779c9cb03d74bd5ac1679fe1620e
-
SHA256
f71b79e2877e4b056a147e65c476cc6c074eebb355909bd24ee9bcc2f9839a4c
-
SHA512
5a3cf0d7451feca85327749861cacbefb9a50d2df9ff9ac0ea80daa00c13b60d69e58fc84c74b0df2605f8f2b1bb66d2a96282adb698e36ad058c8d7d7cda294
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\sh_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\sh_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\sh_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.sh rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\sh_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.sh\ = "sh_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\sh_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\sh_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2684 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2684 AcroRd32.exe 2684 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2544 2232 cmd.exe 29 PID 2232 wrote to memory of 2544 2232 cmd.exe 29 PID 2232 wrote to memory of 2544 2232 cmd.exe 29 PID 2544 wrote to memory of 2684 2544 rundll32.exe 30 PID 2544 wrote to memory of 2684 2544 rundll32.exe 30 PID 2544 wrote to memory of 2684 2544 rundll32.exe 30 PID 2544 wrote to memory of 2684 2544 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\update_perm.sh1⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\update_perm.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\update_perm.sh"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2684
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ba4e97f810fe83774fd5091107b9882f
SHA17653ffde1997a823fad8359b6366db0103715f31
SHA256144aa2f2cb733e3582827d5051099ac1c4abb93c3f90ad965684b7077dd06d55
SHA512dbad82886e57da93a14556efef2b1a663836ab97f86bd24a97c6d98a165b40c10c9749eeb464c9b6e0056302c1b935e3d65a1451b7014277eabcfe65fb384626