Analysis

  • max time kernel
    119s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    17-07-2024 20:09

General

  • Target

    $PLUGINSDIR/app-64.7z

  • Size

    60.3MB

  • MD5

    86fbfdba59094a3d09b47f6aa0f41494

  • SHA1

    364f2df61b70d8eb50b1c0e58c55ce50106dc1b7

  • SHA256

    a7057f26e5d5f58578370940050c4623fb91dbba2e5a3e5408fcc0d7087f923f

  • SHA512

    64aa71dd9a34bd43c8bdc643e800f15ad746068cef68a7bdecf396bf1d0ecb4d53db77dd4f4ff4c19a68b56fe199c7520c22d9bd4891a9af960998536f13a885

  • SSDEEP

    1572864:+b4n3FnJiUkcWP/zKmSJIrlMGDDORT0OBqbSzltm+LA3c:B3FHT5mSJ8DDgTdCSR4c

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2636
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2564
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2640
        • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
          "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z"
          4⤵
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          PID:2192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    31b19fc1bd16aeb5257893e7928d8d32

    SHA1

    08f400e950c0665725f77095d9dd57a221e270d6

    SHA256

    fa2a9f5945f8d3dea3e0bfebb911670add4f7a1ec03c20b1bb6b7043e307a4ea

    SHA512

    3f62aa28bb7ef671d90ce8fc0dc170bb71f07d557b16e6b5fe62676a864b7f5d2e031989f24dbcf2848c1b8bd67c7c113e921d87c39e60b01711c695399c23ff