Analysis

  • max time kernel
    102s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 21:27

General

  • Target

    data/OFFLINE/5EC33410/17F238BD/Bassalu4x10_con30_room.grir

  • Size

    33KB

  • MD5

    c064244eaa3c7f25a82f5028e8e86925

  • SHA1

    68ba089890502a81799c9a4372e427585c57f0e1

  • SHA256

    2fb90c700f0a8d03d2969e83c9eb787bfe30ad631ce5556d2745e6e333ed0367

  • SHA512

    cf346b4067aa94be1fbc890eeec9ab0d9004a3df33e9bfe69085b4496db5c43dddbb7df468bcbfae9771649fe86bf86b35bc88e5ca577c3df38d218d8619292c

  • SSDEEP

    768:8vZXw969SYTUvYli1CfEQoChpxYJQjxn2qdHZUB82wX0z+ahQsOB:aZ0694wiMPok+J62Kf2zUsOB

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\data\OFFLINE\5EC33410\17F238BD\Bassalu4x10_con30_room.grir
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\data\OFFLINE\5EC33410\17F238BD\Bassalu4x10_con30_room.grir
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2176
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\data\OFFLINE\5EC33410\17F238BD\Bassalu4x10_con30_room.grir"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:3056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    8f79a0fb8bf70aa34426d4c4bd495427

    SHA1

    c06b2911dd2cc6d8f84400fa7d195426f5143dcd

    SHA256

    07befe0fd5fa5ffab01f2a05ca596495118018b7bf88d6b1e026e8c9f1f84173

    SHA512

    0bc8d33694a65f31f791adb7ba7ebec54c78444ed845a5b9eda49a623184e68da6a833860091738bc4a331c80ca45402057dd10dd57298d404d5fbc0f6412347