Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    25/05/2024, 17:12

General

  • Target

    Mirage 1.16 v0.2/DIM1/data/villages_end.gz

  • Size

    55B

  • MD5

    9ff30b295f05797deb6ea7b0cb001409

  • SHA1

    0f406d4db2522c831f2dab77b6180684959e9c9b

  • SHA256

    2437ad71ab04a142474c64d6eb2e1836bd062b922d6f6d7ed69e78fada30609d

  • SHA512

    a132db3b23286f6df1d0499adf4fa625d57ba95e3d04562b4f449585c380e276bd4b3bb1509db0fc60c0c11c918563970fd666d88e297b9984ac457746bba080

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Mirage 1.16 v0.2\DIM1\data\villages_end.gz"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2472
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Mirage 1.16 v0.2\DIM1\data\villages_end.gz
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2640
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Mirage 1.16 v0.2\DIM1\data\villages_end.gz
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2848
        • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
          "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Mirage 1.16 v0.2\DIM1\data\villages_end.gz"
          4⤵
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    03e5bd6e0ce354b749bc4fb2985c87b2

    SHA1

    ea7edd6ec1e07e589d9a41ea53885f91f4ca88d7

    SHA256

    d10aa1e0754d2d3fa044989f8185b4dbc38cd08028c92786b0602aeec4c95838

    SHA512

    378c01158d079dc9cf45050e8c5cc29e9eba3022e81211611ed26d47807520dde35728379fe81d726cdb2d7118d3747a8371dfabad468f81d1d2955445468f96