Analysis
-
max time kernel
103s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 22:25
Static task
static1
Behavioral task
behavioral1
Sample
config.json
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
config.json
Resource
win10v2004-20240709-en
General
-
Target
config.json
-
Size
856B
-
MD5
ea7e1f8126ef25b7e1839e2a90d353e8
-
SHA1
9c54c8e1708ddc4eac25b1541f0bf69b5712a624
-
SHA256
520ba11c2a0216d1d6b1b35d004a960474a4dd3ff730dfb9d60f43ff3201f111
-
SHA512
b95697d175430e12239210da623c121bc4947c8fb49b4e1a555d6906112e99620b7da9f14a44b6d2ca4fc641c24a1e03f87be7516d6190d2ad6d8545cdeaec23
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\json_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\json_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\json_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\json_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\json_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.json rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.json\ = "json_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\json_auto_file\shell\Read rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2844 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2844 AcroRd32.exe 2844 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2508 2556 cmd.exe 30 PID 2556 wrote to memory of 2508 2556 cmd.exe 30 PID 2556 wrote to memory of 2508 2556 cmd.exe 30 PID 2508 wrote to memory of 2844 2508 rundll32.exe 31 PID 2508 wrote to memory of 2844 2508 rundll32.exe 31 PID 2508 wrote to memory of 2844 2508 rundll32.exe 31 PID 2508 wrote to memory of 2844 2508 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\config.json1⤵
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\config.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\config.json"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2844
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f457741b5c3d31a79537f02b2c31a763
SHA1f73e2e6b94cb9703b0e1d5109156d99936967304
SHA25646b1979827ed0622bcf33efebf87f91128e709e76e0db5fcc3cd1c800520943c
SHA512a013596f377cc30c42b27049812d9e4c01bf1400f12279d639defdc1e3f9bbbd1516377da1dccd30b3f8a0118d49d744e646f44f7e5162da658bfeddc27fa10a