Resubmissions

12/10/2024, 12:46

241012-pzt4ba1dmf 3

12/10/2024, 12:45

241012-pzd24avhqp 3

12/10/2024, 12:44

241012-pyyeca1dja 1

12/10/2024, 12:42

241012-pxr6ya1cme 1

05/08/2024, 23:13

240805-27gt6s1hln 6

08/07/2024, 16:42

240708-t71chsybln 3

07/07/2024, 23:47

240707-3svcdssckm 10

Analysis

  • max time kernel
    1433s
  • max time network
    1439s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    08/07/2024, 16:42

General

  • Target

    REGFuck-master/README.md

  • Size

    1KB

  • MD5

    ba24c8d97ec913613566fafd9c24456a

  • SHA1

    9f47b105ad17d31bfcba6681a1f8216692d56584

  • SHA256

    6025ff79c07c68d18f3e4e84d671607dc10da71f4617ba820aa37c3780324de5

  • SHA512

    a2c9dfd95bcdb171be680398afd1f4f2f388a3ca4887474f169937cdf6b348699f681de40794ae009da44addc63a5ac0798110d93cc671a895ed2e532baa7981

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\REGFuck-master\README.md
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\REGFuck-master\README.md
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2080
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\REGFuck-master\README.md"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    10febd35cc81bc48ee8461fda2138216

    SHA1

    7ecc9e0308697192ae6e17d9665451a3d6304698

    SHA256

    4bd3b6e28f19a3aaa457410efed82acfc23b60721d92cb6d75d3f8d6006ab131

    SHA512

    1eeebc974ed1adda03bbf2cd62e171dc374586843741440a0efba9b81a187a9b822d4e60c7a6d2dfe45de359391cf9db89e592cef5ae89156344c37b89970a63