Analysis

  • max time kernel
    122s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240220-de
  • resource tags

    arch:x64arch:x86image:win7-20240220-delocale:de-deos:windows7-x64systemwindows
  • submitted
    13/06/2024, 10:49

General

  • Target

    locales/th.pak

  • Size

    731KB

  • MD5

    a970b7e9d3aec2cd1b8ab798b3179f07

  • SHA1

    bf17a7e80e01ac1704a1efdf27baf271b4c21e36

  • SHA256

    cd80bf232f2f128a3d411f52c8039987559dbc1055f746eed6e0e8478b116dc1

  • SHA512

    880555a2ac2f278aecb8794d8cc51f0833052e9f4ca187ed91fa35bb475e68ae3255cfe1dc074eac960c73c203e62c6b38077b266f5fab66ccc3ca73e94d4d60

  • SSDEEP

    12288:EwLc31Mkgs3s5UvfcLRfl1mj83v6DoTGjyeuLAD57Kle9dwn7j9Fv3o09XAyFH1p:EExSK5h5N

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\locales\th.pak
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2892
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\locales\th.pak
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2724
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\locales\th.pak"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2464

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

          Filesize

          3KB

          MD5

          c55203357b05c26c7c549811d4e7edec

          SHA1

          c88f197b14123ebf0d9418040efd8e8a0f14ba49

          SHA256

          0e16f565f711897a19ba7413b3bd5a137ff3741414a731b90b8731ee3df182a4

          SHA512

          750aa3c101642671a1266896155e49b22317ed39475470138c5c6eb3172e32ed2afd88eb5b4f880a91f79b89f2167752e908f3f7ee9bc19c11724ff8ee782672