Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17-07-2024 20:56
Static task
static1
Behavioral task
behavioral1
Sample
hash.bin
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
hash.bin
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
setup.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
setup.exe
Resource
win10v2004-20240709-en
General
-
Target
hash.bin
-
Size
265KB
-
MD5
da77b20827a5e2417faa875cabd12039
-
SHA1
5e5cc661ec89f603594aae11f3b9d7b93f2565f9
-
SHA256
8694ef68bd0f658833018951f2c88a3d37d9da936f3fd3a21b9c0b5f167e61ef
-
SHA512
deb8a71ccc091c78d36416c4c63191f3320226800f2cad49d6531664e4421c87c05082ffd5d9565528da5744c151044ecbb98df91a9e6ef985b676cfb117eb85
-
SSDEEP
6144:BVCXzKcZWY7OgezkGDOM3jQWot7i6GBySaQDYGmOkfl40dPs:qX+cRSgezkmOnx7xFSaFOql40G
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\bin_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.bin rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\bin_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\bin_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\bin_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.bin\ = "bin_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\bin_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\bin_auto_file\shell rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid Process 2824 AcroRd32.exe 2824 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid Process procid_target PID 2032 wrote to memory of 1300 2032 cmd.exe 31 PID 2032 wrote to memory of 1300 2032 cmd.exe 31 PID 2032 wrote to memory of 1300 2032 cmd.exe 31 PID 1300 wrote to memory of 2824 1300 rundll32.exe 33 PID 1300 wrote to memory of 2824 1300 rundll32.exe 33 PID 1300 wrote to memory of 2824 1300 rundll32.exe 33 PID 1300 wrote to memory of 2824 1300 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\hash.bin1⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\hash.bin2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\hash.bin"3⤵
- Suspicious use of SetWindowsHookEx
PID:2824
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD52b64d51f9d51e75b1be20cd784352763
SHA10ffc7830d4fc995d86db77d96691a8c467c7886e
SHA256be53d6d8998e5988634d7c84a1aa13fd2ef4febc5ea56ec373642c6d8fd1e236
SHA5125ad20b4b02f206ab31f792f5899eb677b850496c076b8deedae85a87cf2f7747afc5ed0079aeee78db707ed4937ac303957651fd1eb0cd3323ac245fb6b6b4ff