Analysis

  • max time kernel
    102s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    08-08-2024 17:23

General

  • Target

    02.08.2022132.sh

  • Size

    234KB

  • MD5

    8987c715769702b7755ee448078f3790

  • SHA1

    66b78eb0dfcd68e3712f86bfa7c62165b88280c1

  • SHA256

    7e44f5f77d6fe434b98d63683780270b7237462d83f54dc116ecb06434b82971

  • SHA512

    e765fdff9ab7a6e1a678abb72b12b2999a98abc2650b914289147efbf18a8f5df80bd4eae76daf15988da0a87e836707c6804f122d4c1048fac6e042cafb51af

  • SSDEEP

    6144:NTHOZIVK95lv4QQQ2sSPsGruAirZxHeQ2VbJp:NT3IlvlQQ2s4sGruAilxHBsbJp

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\02.08.2022132.sh
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1328
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\02.08.2022132.sh
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2764
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\02.08.2022132.sh"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    127b94e09696a073f9d8e004f0cd2b7a

    SHA1

    85579be5c32cac62e3ba0533a2846603d41d1573

    SHA256

    6298874c8f055d23e4f366acd38e7ed9c978d9caf8bd47aa929dc26104b2129d

    SHA512

    6d02d4629c060271b23d66edbf8cff48049e42889aa1b2c137167ade6be49e248e4adce2482965ebc161e9947418d28e8f0d8665f01d323d05644c6ebe3f4546