Analysis

  • max time kernel
    119s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    03/07/2024, 04:56

General

  • Target

    locales/bn.pak

  • Size

    765KB

  • MD5

    bc688ba7dd2b0f9946ac98a1df15131f

  • SHA1

    b453ec6785191b3dbd5d78e7b25b9481b6522b32

  • SHA256

    6ad844d2b22c8fbf3587ea603140deb1475dab934ac62e402dbf1c6946dc882e

  • SHA512

    3d60102975a6acb39ad5f750128ab4967bdb5a64eeb398c5fc71e5fcca860eb97487df4e85269a5ffdc1f030bae2ff1c03d61b08565792f84696693aef8119ba

  • SSDEEP

    3072:PnsmuG+M6YiWRQGbMzkoBbLN7SG5zwXl9M:Pv+gvRlbMzBbLB54lm

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\locales\bn.pak
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2400
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\locales\bn.pak
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2720
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\locales\bn.pak"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    baa2a6951c7175181da07f4f5124d5e2

    SHA1

    baac6962277a9699f7f096cc29969e0ffb5cc02e

    SHA256

    f8cab844125892f561b03ffeeb2c81ed79b473aebe377ce2b09f4269443394a9

    SHA512

    4fd9a913520d3e2df7b7fefe17377765cbd4f2013a9da640177cd1dcae26e129cc2ffd1a0636c726ae6cbd1a82e9f5987ce09e5c3203918b73121b9e707a8539