Analysis

  • max time kernel
    119s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    27-06-2024 21:46

General

  • Target

    locales/bn.pak

  • Size

    812KB

  • MD5

    fac2c752c57175a4b1f4630e3667123e

  • SHA1

    a2dbcf1dd7b3cac499b9f782c7393ab438039584

  • SHA256

    71f99a67bb310fab8068eeed7ce24ea7624a66051ba4e719d051cc7e67e78001

  • SHA512

    4820704bd92dfb60736da5b84c8bc9135fca484c678585ec9d26dcb90632e382f354d03b539599f4816feb027dd285ff06ed8a520bede56d7a1c590d942e4250

  • SSDEEP

    3072:3V/m0JEVzjcnmbVrH4kSBbdXWSM5QwXlFE:3w0a5rHEBbd+5tle

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\locales\bn.pak
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\locales\bn.pak
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2700
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\locales\bn.pak"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    7447dc20c202a39ad4d7966792953a3d

    SHA1

    2929e233cc5fb00463761ae7e49c24f3ce84bc8a

    SHA256

    52332a036c03a4431500a9fd50eff1ee988560f6f2cbac13b182700c727e1ba5

    SHA512

    ed3cf35af1cd20d203674f1db878f662dc270aae654eca5cb6cd0d1671974f0245767ed8568d7275710dcfdb8099ef07f0c407ed80c725ee88c89667e6e20fcb