Analysis

  • max time kernel
    359s
  • max time network
    364s
  • platform
    windows7_x64
  • resource
    win7-20240221-es
  • resource tags

    arch:x64arch:x86image:win7-20240221-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    28-05-2024 03:41

General

  • Target

    locales/bn.pak

  • Size

    812KB

  • MD5

    fac2c752c57175a4b1f4630e3667123e

  • SHA1

    a2dbcf1dd7b3cac499b9f782c7393ab438039584

  • SHA256

    71f99a67bb310fab8068eeed7ce24ea7624a66051ba4e719d051cc7e67e78001

  • SHA512

    4820704bd92dfb60736da5b84c8bc9135fca484c678585ec9d26dcb90632e382f354d03b539599f4816feb027dd285ff06ed8a520bede56d7a1c590d942e4250

  • SSDEEP

    3072:3V/m0JEVzjcnmbVrH4kSBbdXWSM5QwXlFE:3w0a5rHEBbd+5tle

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\locales\bn.pak
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1056
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\locales\bn.pak
      2⤵
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads