Analysis
-
max time kernel
103s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/08/2024, 14:50
Static task
static1
Behavioral task
behavioral1
Sample
7c4e613cf4db19f54030097687227809f965a951a26a44a882692ece6e642e3c.unknown
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7c4e613cf4db19f54030097687227809f965a951a26a44a882692ece6e642e3c.unknown
Resource
win10-20240611-en
Behavioral task
behavioral3
Sample
7c4e613cf4db19f54030097687227809f965a951a26a44a882692ece6e642e3c.unknown
Resource
win11-20240802-en
General
-
Target
7c4e613cf4db19f54030097687227809f965a951a26a44a882692ece6e642e3c.unknown
-
Size
3.9MB
-
MD5
fa7c1226c3b8a433908032f3b243b5b8
-
SHA1
024d44999f8cf53879fc7232f44c8148d9295028
-
SHA256
7c4e613cf4db19f54030097687227809f965a951a26a44a882692ece6e642e3c
-
SHA512
486ba7a4f50a1aca301b8781953ef752f87eedf21115d3c84428b56efafc1f05819e696dc3a8cb6958a5b4a296d0980d9a693b408fcd1905b2b2ae1a3a3cc64e
-
SSDEEP
384:2ZSoImz0rWXNDphVGRQiGbhwb8hdMTUrvES+1H+brTcwmED/U4voZxI25CUAuEDh:2ZSVmz0rwNtPGWbD
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.unknown\ = "unknown_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\unknown_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\unknown_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\unknown_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.unknown rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\unknown_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\unknown_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\unknown_auto_file rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2732 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2732 AcroRd32.exe 2732 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1512 wrote to memory of 2848 1512 cmd.exe 31 PID 1512 wrote to memory of 2848 1512 cmd.exe 31 PID 1512 wrote to memory of 2848 1512 cmd.exe 31 PID 2848 wrote to memory of 2732 2848 rundll32.exe 32 PID 2848 wrote to memory of 2732 2848 rundll32.exe 32 PID 2848 wrote to memory of 2732 2848 rundll32.exe 32 PID 2848 wrote to memory of 2732 2848 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\7c4e613cf4db19f54030097687227809f965a951a26a44a882692ece6e642e3c.unknown1⤵
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\7c4e613cf4db19f54030097687227809f965a951a26a44a882692ece6e642e3c.unknown2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\7c4e613cf4db19f54030097687227809f965a951a26a44a882692ece6e642e3c.unknown"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2732
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD50d2834225f04323a625ae6aafdb8facd
SHA1937ad960b7f924988299d8b672051759fa32a689
SHA256c44d8a89c7c9516c26d9d29a3ccd0adadfd6167d9fe91f40648810d1e658f4fa
SHA51254f9743a1d89e31145b4a01f7ff36c92b7cb2b9db318c0d1172f04a79f776a0de70962e58bffe52e93a3ddef0af02049354dfb9199f53d159453b751ae2a6559