Analysis

  • max time kernel
    363s
  • max time network
    367s
  • platform
    windows7_x64
  • resource
    win7-20240508-es
  • resource tags

    arch:x64arch:x86image:win7-20240508-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    09-06-2024 16:48

General

  • Target

    $PLUGINSDIR/app-64.7z

  • Size

    64.4MB

  • MD5

    be1392655f1fdb9d3159f4d56b3e82bb

  • SHA1

    3896dab8b0ed76926d78956619a767f429bb5016

  • SHA256

    733682dc17bf7c5e243cdae28597a2b0271dd6e3532d83120572a99856e7b960

  • SHA512

    bcb5fa1c47f90c61a92dfd6ffe36cc4dc563cb21b80b47e118993e315ceb19190e32d6f181123743191d6a16e6c7e01b83b6d0210c909960a394516e770b8f28

  • SSDEEP

    1572864:w34suK99KHLjoe1M6Cj2a/dZOi2jVnzntAOa385+xdfRzFKd+MF04d:09+jFe6HYLo1aMYNRcsS

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1528
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z
      2⤵
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads