Resubmissions

03-06-2024 03:27

240603-dz99raah93 10

03-06-2024 03:24

240603-dycbbshd9y 3

Analysis

  • max time kernel
    141s
  • max time network
    263s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240508-en
  • resource tags

    arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    03-06-2024 03:24

General

  • Target

    ver3_appfile.rar

  • Size

    6.9MB

  • MD5

    70a4b0088163ebb0805eeff9bc766658

  • SHA1

    746e8f51637b5861858ef453de04964b4eb23246

  • SHA256

    5104e10875fb2a5e76fff9e552e9007d7be2049546dc8ce7443e2c62de4981ae

  • SHA512

    a0c8be17811298ddb333d4f030b8dc6a12de7f24893d94cacfaac68324baeb68a8e75874ead938ff4dedb6b2ff9b01b85168b005475c5bc87bb4ec4bdb630b28

  • SSDEEP

    98304:nQAcZjsI/pfneEb+NJ5xiMAe74hCXjIXNwpjL2qTFZHc/G3KeM/jl7EuCh8fJAHD:QXZYunlbw5jqByN6k/kVmkA/r

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\ver3_appfile.rar
    1⤵
    • Modifies registry class
    PID:2732
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3792
    • C:\Program Files\7-Zip\7z.exe
      "C:\Program Files\7-Zip\7z.exe" "C:\Users\Admin\AppData\Local\Temp\ver3_appfile.rar"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4548
  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:4656
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:948

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

      Filesize

      14KB

      MD5

      dd66c4492777d83428ad0b689a4a17b7

      SHA1

      0fbc1ccd82c840be2868d571aedad4da20baa72d

      SHA256

      e956efe6e2ea612773dda47651640e0bedfa6409afac1a06064f73ec47ec6650

      SHA512

      2b8d58e36f13fda4cf8b9e34eb516540b913d8ea7e4dac90b51dec12492b65e218c09b1129838b1c34277ef3bcc7821a7834e762a915dd7548c7870692016b08

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

      Filesize

      14KB

      MD5

      490f33312e20c78d8d8a98e97f9c8161

      SHA1

      c1e12b7db81587945344520795fbc842858a93b9

      SHA256

      cabce1793a6cea63e7451d1bc70db8b55cf1d7c74ece8377fe842641dacb3ee6

      SHA512

      0196aea378338ea286d7d35cba829a1f917c2e08367e16cfc8c10aa26b6ca39792e84445e5c6362d43090c529de36a1cb1935bfa8bf3bbde0f78846cf5d9f25e