Analysis

  • max time kernel
    121s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    28-06-2024 05:32

General

  • Target

    selfbot/config.json

  • Size

    560B

  • MD5

    f50cd81113c1bfec829073237e1aa964

  • SHA1

    155fb38b596caec324bff4d19cb9d7f760b5291e

  • SHA256

    c780ef77c32653c6fdccc2db14afabb6fe2141c29a74d3d1d7eb7dce679c1bcd

  • SHA512

    9db63ca64617611ed3cb94b18f56ce88266a254b8745c47202e06e37bb19a80305c38edd6f1597082fa96a9fd5ad8b4818383d01e46d260cf93e284f7cabc1b2

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\selfbot\config.json
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\selfbot\config.json
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2620
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\selfbot\config.json"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    7c6bf6f4e72787a87370b30b1069ed5f

    SHA1

    5c58f6fe82125ae838530d3ba0c8c4c37a310d31

    SHA256

    f544ba658df09c8e3b02a1d9b5ea835641eba42da24589cfc6f7f36c13e5cfda

    SHA512

    8ced288051a59a3b76189f31dfec30212222f17299882afcbc1f544388bb6fea89eacc34ed53ae490d858dcceb1591f4eaccc9f756dc24bb75f5a14a44fe1ae7