Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14-06-2024 06:15
Static task
static1
Behavioral task
behavioral1
Sample
admin-ajax.php
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
admin-ajax.php
Resource
win10v2004-20240508-en
General
-
Target
admin-ajax.php
-
Size
1B
-
MD5
cfcd208495d565ef66e7dff9f98764da
-
SHA1
b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
-
SHA256
5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
-
SHA512
31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000_CLASSES\php_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000_CLASSES\php_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000_CLASSES\php_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000_CLASSES\.php rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000_CLASSES\.php\ = "php_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000_CLASSES\php_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000_CLASSES\php_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000_CLASSES\php_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2728 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2728 AcroRd32.exe 2728 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2624 1900 cmd.exe 29 PID 1900 wrote to memory of 2624 1900 cmd.exe 29 PID 1900 wrote to memory of 2624 1900 cmd.exe 29 PID 2624 wrote to memory of 2728 2624 rundll32.exe 30 PID 2624 wrote to memory of 2728 2624 rundll32.exe 30 PID 2624 wrote to memory of 2728 2624 rundll32.exe 30 PID 2624 wrote to memory of 2728 2624 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\admin-ajax.php1⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\admin-ajax.php2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\admin-ajax.php"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2728
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e079f635c8914675ac1ac299f5201d64
SHA1778d3fc00e8598bda7ef96dc2920087c6d46927c
SHA256b112246e6c3204bf9962b680899146e468c3967cf5377d5907f173b5c033be23
SHA512d0f9f34527d2bdb44d9468eeea69f2f80beb58316eb1c87e6beb45f1bfba07fa4a606406b81417481434f4c650dd2568122409abf49c3bc970776cf730bb7cd4