Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 20:33
Static task
static1
Behavioral task
behavioral1
Sample
rev_shell.sh
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
rev_shell.sh
Resource
win10v2004-20240508-en
General
-
Target
rev_shell.sh
-
Size
102B
-
MD5
a0e5682687cd1f15f004f02e726b1007
-
SHA1
fbac84bd6c559265e0b5c5be5dfc6619e50224aa
-
SHA256
5e98d30502164fac1ea8c564af0513e708a4cd121f6919b0fb85b7abb7bbb639
-
SHA512
fccd196e4f9541ae195691bc31272f6f61702913d472080cbed07f57f96afa71c6e0eff42ac4c1811c4f9ee491b866b6e273abf37565009f687e65fc09fe34a7
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\sh_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.sh rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\sh_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\sh_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\sh_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\sh_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.sh\ = "sh_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\sh_auto_file\shell\Read rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2640 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2640 AcroRd32.exe 2640 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2164 2224 cmd.exe 29 PID 2224 wrote to memory of 2164 2224 cmd.exe 29 PID 2224 wrote to memory of 2164 2224 cmd.exe 29 PID 2164 wrote to memory of 2640 2164 rundll32.exe 30 PID 2164 wrote to memory of 2640 2164 rundll32.exe 30 PID 2164 wrote to memory of 2640 2164 rundll32.exe 30 PID 2164 wrote to memory of 2640 2164 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\rev_shell.sh1⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\rev_shell.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\rev_shell.sh"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2640
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5251bb705587cf6365f447ba96752040c
SHA15276cad8ce8d5a5a664e460abfaa445e8e7ba2df
SHA2568920a8c128587111e34baf5d5ae07eb00752ecd54be8101d935fcfebea347b40
SHA5120f3b02dbc6de55348535ea390881397f06c9e761ece53e21eb1ac862bcd8bbf22f79df08ea01d4cf8c4e28b6c7adf89f7a4e63385b2267030ab9472a64504c29