Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    08/06/2024, 04:48

General

  • Target

    x - Ware src/Uptime/Frozen/Plugin.cs

  • Size

    1KB

  • MD5

    57cdd223f461b0e7d42bb70ea493df09

  • SHA1

    9d31f8d3b8c69f4f40f5f6f20e214abd9ba5301b

  • SHA256

    25207864c7d5711506468327b56d0bccee267e30f2192928968db7336ce25f0b

  • SHA512

    4e63a8eafd66d13105202551040f8c356fbb174990a22318388ed9f521fab709b6a7d2d981aea308509a847b2ffa2d169639d494c1923218da3d08ec2d6b4b92

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\x - Ware src\Uptime\Frozen\Plugin.cs"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
      "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\x - Ware src\Uptime\Frozen\Plugin.cs"
      2⤵
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    9eb1f45d0e8cb635d5ce076d9b617477

    SHA1

    c582e20e85d1ffdb1bc6417ab6750c30b5ced309

    SHA256

    a3da3998ba3b9c8f33fb3b9c7575b9d84e6d9285a92a6033c97614245be78ae6

    SHA512

    3e941780785de5f55240e52ce026ff5ad5242a76f83206d6facc66b9e2a1a76176e61dd46bde9817b3bfd6409c7cf29d61354a7eeb34921b0382b1211acd50b3