Analysis

  • max time kernel
    102s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 21:27

General

  • Target

    data/OFFLINE/5EC33410/11CC83BD/Gater Factory.ngrc

  • Size

    36KB

  • MD5

    7a4a744484f5a7f282ad09cd8dc64935

  • SHA1

    e0235e58b672bf9ebd9da19ad804e6f5bee3dc6b

  • SHA256

    205a6233fe7d94a37e8a6bbe9d1786de3652e43a2b79837dc418eb6d906be0d1

  • SHA512

    20f9ebb004d7d7a4149ed6685b4be1f017a76cc4c5b57e07776a9e0e80150e650a55880b00bd13e0f35b10eeb2b3c8262b328f35ff727a45a82cdd19b83f4930

  • SSDEEP

    768:CSQSXhKYjJyAw4Q0mtZ2KkhX74zST/9SrDENHkJb:CSQSXhKYjJyAw4Q0mt4KkhX74zST/9SX

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\data\OFFLINE\5EC33410\11CC83BD\Gater Factory.ngrc"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\data\OFFLINE\5EC33410\11CC83BD\Gater Factory.ngrc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2728
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\data\OFFLINE\5EC33410\11CC83BD\Gater Factory.ngrc"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    dc8505be1240a134ab6801811ce87cb6

    SHA1

    c8c33ea8e516e87a56943291689ff049dc45ac20

    SHA256

    d8fbacbd9978f1259d242e1ee1357650a64465408f6bd08d0c87708b97d54091

    SHA512

    2d1102c90b65c33359858560122aaa6256bd8d27b762f060df28a78eed916b4cb94a089ac0db58925705a757d1764b0b1cd95dbc0d3572ce75287aac81b69268