Resubmissions
07-08-2024 21:06
240807-zxvl6sxfkf 1006-08-2024 20:12
240806-yzbfmssgqc 1006-08-2024 19:51
240806-yk45eaydrn 10Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06-08-2024 19:51
Static task
static1
Behavioral task
behavioral1
Sample
BrowserUpdater.vhd
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
BrowserUpdater.vhd
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
out.vhd
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
out.vhd
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
BrowserUpdater.lnk
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
BrowserUpdater.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
System Volume Information/WPSettings.dat
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
System Volume Information/WPSettings.dat
Resource
win10v2004-20240802-en
General
-
Target
System Volume Information/WPSettings.dat
-
Size
12B
-
MD5
180b816e2572459f17781afb69001011
-
SHA1
a1c359386cc27618741600f0bb097e9f3879b261
-
SHA256
8d9013521ff515a10aa929989195a442bd4d78bd5b7aef89a5dd987b94411f9c
-
SHA512
02ae89704f0ade1164b4077d0f3d1f8c12829c2538acfad1f05fa9d7f2ce234fc61a74b7a2d5eb7dd4b6981c7a56c9806c8d18d48b6fc2d4ee1aa3e9f60f4982
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\dat_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\dat_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\dat_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.dat\ = "dat_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\dat_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\dat_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.dat rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\dat_auto_file\shell\Read rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2768 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2768 AcroRd32.exe 2768 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2776 2084 cmd.exe 31 PID 2084 wrote to memory of 2776 2084 cmd.exe 31 PID 2084 wrote to memory of 2776 2084 cmd.exe 31 PID 2776 wrote to memory of 2768 2776 rundll32.exe 32 PID 2776 wrote to memory of 2768 2776 rundll32.exe 32 PID 2776 wrote to memory of 2768 2776 rundll32.exe 32 PID 2776 wrote to memory of 2768 2776 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\System Volume Information\WPSettings.dat"1⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\System Volume Information\WPSettings.dat2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\System Volume Information\WPSettings.dat"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2768
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD56e3d2c461c2cf78157c2b8d6eda49b16
SHA1f69563dd2e3a2172738d06cd841fb558a30f5fb4
SHA25663494c4fb458bf14f8df8b2b62924de5aeddc3e820a9851fd2c8b1c16caebb1b
SHA512112e57a72550715218facd2b41504949e0dde12fc88b20f9ba1e3d0e0233df950de31397d57424f2ed07b161c0e37bfe11fb3d070ca6447e3ee570af6680f368