Overview
overview
3Static
static
1System Vol...ps.zip
windows7-x64
1System Vol...ps.zip
windows10-2004-x64
1System Vol...3.pcap
windows7-x64
3System Vol...3.pcap
windows10-2004-x64
3System Vol...f.pcap
windows7-x64
3System Vol...f.pcap
windows10-2004-x64
3System Vol...f.pcap
windows7-x64
3System Vol...f.pcap
windows10-2004-x64
3Analysis
-
max time kernel
48s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 19:07
Static task
static1
Behavioral task
behavioral1
Sample
System Voleume Information pcaps.zip
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
System Voleume Information pcaps.zip
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
System Voleume Information pcaps/43499bef-a2ad-4719-aaf9-c2a03b2fa5f3.pcap
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
System Voleume Information pcaps/43499bef-a2ad-4719-aaf9-c2a03b2fa5f3.pcap
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
System Voleume Information pcaps/d85b28a3-e428-427f-9728-3e39f7aa2fdf.pcap
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
System Voleume Information pcaps/d85b28a3-e428-427f-9728-3e39f7aa2fdf.pcap
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
System Voleume Information pcaps/f2e83873-ad5c-4abb-b0d4-e3b752b1f46f.pcap
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
System Voleume Information pcaps/f2e83873-ad5c-4abb-b0d4-e3b752b1f46f.pcap
Resource
win10v2004-20240426-en
General
-
Target
System Voleume Information pcaps/43499bef-a2ad-4719-aaf9-c2a03b2fa5f3.pcap
-
Size
7.8MB
-
MD5
f25746eda71536acae3bf8cd8b4e0a5e
-
SHA1
8129485a2928ca4af5727e7a7e4a9b430417e03d
-
SHA256
87e8295f9c88604abd0817b33f6d259190d2d6fa00c4f16fe6c6d0ebe48df6c4
-
SHA512
da7e04571261070b991dff3f85d7f4a2923a792f0286a8b0abfd7949477a1bd2645b2196d4151d5d85b8adf9b56e134349f4542558cda7f1627e14304368d10e
-
SSDEEP
196608:miimuUtfc1qakKUsYObJ4Clf8YnSCB5Mh+770icOz:mNUmAuXaYSCgh+X
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\pcap_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\pcap_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\pcap_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\pcap_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\pcap_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.pcap rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.pcap\ = "pcap_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\pcap_auto_file\shell rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2680 AcroRd32.exe 2680 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2916 wrote to memory of 2572 2916 cmd.exe rundll32.exe PID 2916 wrote to memory of 2572 2916 cmd.exe rundll32.exe PID 2916 wrote to memory of 2572 2916 cmd.exe rundll32.exe PID 2572 wrote to memory of 2680 2572 rundll32.exe AcroRd32.exe PID 2572 wrote to memory of 2680 2572 rundll32.exe AcroRd32.exe PID 2572 wrote to memory of 2680 2572 rundll32.exe AcroRd32.exe PID 2572 wrote to memory of 2680 2572 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\System Voleume Information pcaps\43499bef-a2ad-4719-aaf9-c2a03b2fa5f3.pcap"1⤵
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\System Voleume Information pcaps\43499bef-a2ad-4719-aaf9-c2a03b2fa5f3.pcap2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\System Voleume Information pcaps\43499bef-a2ad-4719-aaf9-c2a03b2fa5f3.pcap"3⤵
- Suspicious use of SetWindowsHookEx
PID:2680
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e957b1865727ebb2994fe03a21674f4e
SHA15533c8205c4ec490f6e8bdc94aaf9810bb07597e
SHA256d8edab01d7f9a28acba63f25540e9ccc2fa4d178450be1df9a5880617b264e40
SHA5125e64890d173c0280a13ad93f1734111eae2a50aba443dca2eb5a9ab3820886b6b9134104f1bde11b5556edc84fe32f12111a232e3b11a4b2fc4928b9300d24ed