Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 17:16
Static task
static1
Behavioral task
behavioral1
Sample
17454678793.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
17454678793.zip
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
5316fc2cb4c54ba46a42e77e9ee387d158f0f3dc7456a0c549f9718b081c6c26.zip
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
5316fc2cb4c54ba46a42e77e9ee387d158f0f3dc7456a0c549f9718b081c6c26.zip
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
Autoit3.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Autoit3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
script.a3x
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
script.a3x
Resource
win10v2004-20240508-en
General
-
Target
script.a3x
-
Size
547KB
-
MD5
dfa96717b69fa69d264a60b9de36f078
-
SHA1
b18dd41bcdc7a75a4b505cbdfb337cf19a2934d8
-
SHA256
493fb733897f4c3d7adf01d663e711e2e47240bfdf5b99abd230aa809f43a8cf
-
SHA512
5772cdac81361297d72f620e23068da8180fce09935340caaf279b6719f446ad3fd85dfc3004258e943092a73f914b84f9a12ef85630ac32410d1a7ddd3b41c7
-
SSDEEP
12288:NeZu+gIZHxCQ4bamk1FNTVRppgU+ehWwhz5u6+c5zzq:VqRCQ4RU7ppgK35t+cdO
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\a3x_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\.a3x rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\a3x_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\.a3x\ = "a3x_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\a3x_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\a3x_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\a3x_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\a3x_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2772 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2772 AcroRd32.exe 2772 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2348 wrote to memory of 2732 2348 cmd.exe rundll32.exe PID 2348 wrote to memory of 2732 2348 cmd.exe rundll32.exe PID 2348 wrote to memory of 2732 2348 cmd.exe rundll32.exe PID 2732 wrote to memory of 2772 2732 rundll32.exe AcroRd32.exe PID 2732 wrote to memory of 2772 2732 rundll32.exe AcroRd32.exe PID 2732 wrote to memory of 2772 2732 rundll32.exe AcroRd32.exe PID 2732 wrote to memory of 2772 2732 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\script.a3x1⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\script.a3x2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\script.a3x"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD510d594d9153ca5c1581e19a97c76dc25
SHA18d40d712d823dfce775fb7d89b819dae9763dfbe
SHA256184253263e016301ad44c694b617438d650fe454308878520d6e92ba370b7170
SHA512b72dcccd0e2333b8af49ae5f8e5b0d8416e702dd725d845bf519e809c3620730c3c644b0b2f71d584f3fe777a13a66b80b00f5fab7b334f0920781192db822b7