Analysis
-
max time kernel
102s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08-08-2024 14:44
Static task
static1
Behavioral task
behavioral1
Sample
cab.zip
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
cab.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
parcel_label_photo.vhdx
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
parcel_label_photo.vhdx
Resource
win10v2004-20240802-en
General
-
Target
parcel_label_photo.vhdx
-
Size
36.0MB
-
MD5
48806b8dd97db25041bc3678a095dba4
-
SHA1
9c1a36fd5ca76390d4a102e1f5e85977d9d22b8c
-
SHA256
6d59388482835a122b9522752ef1c61b249ed12909258fab0aa10de69f3bf26d
-
SHA512
0fd66a64e816eb9ac19d9991e60e6189317fac04f00707dca6531074a48b1bfc5cfcfc76a65f2961a6ec87ee0f30a450443a94eecc3f9e8417cca95dfc8cc359
-
SSDEEP
6144:9rZn7y/EGuH/cpiysa2yuGncYM5YAImUaBe1Y0Pgne8cq1Gt8PbdC:1UDuH/c8ysCuGnNmUaBe1Nm1Y
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\vhdx_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\.vhdx\ = "vhdx_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\vhdx_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\vhdx_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\.vhdx rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\vhdx_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\vhdx_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\vhdx_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2144 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2144 AcroRd32.exe 2144 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1400 wrote to memory of 3048 1400 cmd.exe 30 PID 1400 wrote to memory of 3048 1400 cmd.exe 30 PID 1400 wrote to memory of 3048 1400 cmd.exe 30 PID 3048 wrote to memory of 2144 3048 rundll32.exe 31 PID 3048 wrote to memory of 2144 3048 rundll32.exe 31 PID 3048 wrote to memory of 2144 3048 rundll32.exe 31 PID 3048 wrote to memory of 2144 3048 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\parcel_label_photo.vhdx1⤵
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\parcel_label_photo.vhdx2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\parcel_label_photo.vhdx"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2144
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5201a993a4e79c1feab0f337b22225d1a
SHA1cdbecbb7191378d91ee8c10efe281e579c9a35b5
SHA2561019cf888119af122a4201a82fcc1b3ed5fc80a05ca5ddd16e02c3e0c47e689e
SHA5123209913f55bb88cc62e0efe7c0d862c84d3cabccb5328661ae534815effd6448d1a878514a2bb213913995628218ec996786736127b575536458c80d55166cfc