Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09-07-2024 07:32

General

  • Target

    Hylozoism/Unfrail.nay

  • Size

    514KB

  • MD5

    2494532c59743970919b467911cf098c

  • SHA1

    0a651c761229511408ec9974dae00bc051bdcb4b

  • SHA256

    af0e57677bd14876793edb39eff56c044919a1ab62cd4b16754f6745b52f22e4

  • SHA512

    eabe10516f56fc95c24512e1d6ea0d6f9f28d353febf51531fa200479abe5a296da598f3187dce73c96949daec5aabb647ebddc4c7a75a71c56b2c627be9b894

  • SSDEEP

    384:GlAaIvea1OoHvWR7RyDyrTF7TeFNXvCGEKutK3cAgnXE37WzaZ3IIDOGAOBp5qXu:0cTKRRvJgr6UWGKIDbzEUKf1gip9xvE

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Hylozoism\Unfrail.nay
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Hylozoism\Unfrail.nay
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2708
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Hylozoism\Unfrail.nay"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    24ba5dc4eedbe438f8d2bdd666fe8f70

    SHA1

    3fd84c065acc397860450c75bf75ff22fe0e04c6

    SHA256

    879268a5621356a78a9b95253a6f6fe77b0911b31be8200e124f26f1ccc8f838

    SHA512

    b89e3c911c77b24fb0fd9ede250e01f67802f8cadd9143b2bf126d79d051be4371cc1c313a567226dd84cceaa77db6921df4e896476fe74b917ccacb897c6bc7