Overview
overview
10Static
static
3infinity source.zip
windows7-x64
1infinity source.zip
windows10-2004-x64
1source/LICENSE
windows7-x64
1source/LICENSE
windows10-2004-x64
1source/README.md
windows7-x64
3source/README.md
windows10-2004-x64
3source/source.zip
windows7-x64
1source/source.zip
windows10-2004-x64
1ed01ebfbc9...aa.exe
windows7-x64
10ed01ebfbc9...aa.exe
windows10-2004-x64
10Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 19:07
Static task
static1
Behavioral task
behavioral1
Sample
infinity source.zip
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
infinity source.zip
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
source/LICENSE
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
source/LICENSE
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
source/README.md
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
source/README.md
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
source/source.zip
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
source/source.zip
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe
Resource
win10v2004-20240709-en
General
-
Target
source/README.md
-
Size
70B
-
MD5
39148bc21924851d9082b687dc69e2dc
-
SHA1
5d1e5490476227aa8877b87aad184031e19dc33a
-
SHA256
76a94c98df32a1d37cc7f1e2b86bdc524eda3fedcdb35e57de0dd56bd976142f
-
SHA512
2415bb9de017c086abf8315e4288a04d5eb6048af2637e75843778f24de6834154b68365794b6cbc09ef5da0fe96d5bfce20227bf3656d23b7f148fb60988041
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\md_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\.md\ = "md_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\md_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\md_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\md_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\md_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\.md rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\md_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2760 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2760 AcroRd32.exe 2760 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2300 wrote to memory of 2916 2300 cmd.exe rundll32.exe PID 2300 wrote to memory of 2916 2300 cmd.exe rundll32.exe PID 2300 wrote to memory of 2916 2300 cmd.exe rundll32.exe PID 2916 wrote to memory of 2760 2916 rundll32.exe AcroRd32.exe PID 2916 wrote to memory of 2760 2916 rundll32.exe AcroRd32.exe PID 2916 wrote to memory of 2760 2916 rundll32.exe AcroRd32.exe PID 2916 wrote to memory of 2760 2916 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\source\README.md1⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\source\README.md2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\source\README.md"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD57e265e65afb9bb3e1ac05d9296d34128
SHA15c5505c1e455e9cd06e7c172407b4c2ff5728ef8
SHA2567fea5b86828718baab9974097e6f740776c20b4cce4a92ccd60057709e732c0a
SHA512cdaae6e48cbd31319d501349412cb22adb631909b5b522831308a287a92f882a51761e78ed2d1fcfbf4601fc27b8bea847892accd9dca9c6751a6920216ff03f