Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 15:33

General

  • Target

    Protect/Core.dll.config

  • Size

    420B

  • MD5

    e3d2741928e80b1c896e9cd0c89eb905

  • SHA1

    2e47a6ab3ec84d7b7ccfa52f4da45df456e421fe

  • SHA256

    4cfa2763c40c898330415a35407ec494bd139422f9b01bd0045ba787d149e40a

  • SHA512

    1a442ad424d5e258414ab4b8e4e223d54f356f786ae12e4ccdbe4acdade72bb4f33a6e26bb2e77584ab4dbc71e0c116865f33f99f676b43d9ea1247c30685924

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Protect\Core.dll.config
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2740
    • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
      "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Protect\Core.dll.config"
      2⤵
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2476

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents
    Filesize

    3KB

    MD5

    932f72e457152e7ec8cf3e0ecb53bfeb

    SHA1

    83cd221f05d6862a3e1fc8df6336b06528670fb3

    SHA256

    9c0e31b6154b23a97a78c7c593550f2c50f6288155f89dfcb48cbbf6bb6cda75

    SHA512

    2aaa4bd8837a58fa9dc36d2b32092f2b3c5a7b1f924c5d11d78a2e78809391f1387b794aceab36c9245c41d7de1df27ec58b63839869b188d649aec6a67157d4