Analysis
-
max time kernel
48s -
max time network
39s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-06-2024 12:01
Static task
static1
Behavioral task
behavioral1
Sample
Windows 7 x64-000008.vmdk
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Windows 7 x64-000008.vmdk
Resource
win10v2004-20240508-en
General
-
Target
Windows 7 x64-000008.vmdk
-
Size
387.1MB
-
MD5
3a620b8bf0012bb9903129b83ea86bd2
-
SHA1
e4ec9d6fcdcca77ff5dbb0c8e5983da73788a9a2
-
SHA256
e1d963b95b58056f2bc2ccddad4482df16c8a147f8a2bcbcc104d672fe104886
-
SHA512
21275ffad6c86c8bb68bac19ab7ed9e0b3653d479a9ebd775bf2efa04e9799ec8a8fc4a59cb0c63fd796dfe754ed2387fd152bb984aa30d5fccaa6b24b64c2ee
-
SSDEEP
3145728:tDFaInFN9a31Cs/rJdmcrfKJd8vxdOxzZIV5VUnXAY:LzsR/rJdvQd8vXMZIzynF
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\vmdk_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.vmdk\ = "vmdk_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\vmdk_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\vmdk_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.vmdk rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\vmdk_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\vmdk_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\vmdk_auto_file rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid Process 2916 AcroRd32.exe 2916 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid Process procid_target PID 1624 wrote to memory of 2720 1624 cmd.exe 29 PID 1624 wrote to memory of 2720 1624 cmd.exe 29 PID 1624 wrote to memory of 2720 1624 cmd.exe 29 PID 2720 wrote to memory of 2916 2720 rundll32.exe 30 PID 2720 wrote to memory of 2916 2720 rundll32.exe 30 PID 2720 wrote to memory of 2916 2720 rundll32.exe 30 PID 2720 wrote to memory of 2916 2720 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Windows 7 x64-000008.vmdk"1⤵
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Windows 7 x64-000008.vmdk2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Windows 7 x64-000008.vmdk"3⤵
- Suspicious use of SetWindowsHookEx
PID:2916
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD551c2cc3628f33bd264b8b8bf9b61a50e
SHA1f24b75b273eb9835ec94eafd2a8b29b90e72bf2b
SHA2563f9c2dde7c5564da199d8252e93f7289d00e68c6571dea0fafb56684912e3b73
SHA512b59ec3b9d031317386b02ac3bcc5c333925bd8b169f6a05b022508527cadfe2df935d6c1cd6d7e5d9f316a140bcd43d5b2cdde12162712093127c309e56113b9