Resubmissions

10-08-2024 11:37

240810-nre4raxekr 10

Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    10-08-2024 11:37

General

  • Target

    mw3/Database/uninstall_qdb.dbd

  • Size

    35KB

  • MD5

    4d8b378243c7cf774b51f10c4f2f6375

  • SHA1

    4ca37c7249375bc7b14a7357d306b3aa288025f8

  • SHA256

    d0a736b24467c44dc8419c33e1515a9b5d3bd411fdc76ed6e1f79685060932dc

  • SHA512

    3bf1a76f38663dff587ac5e9b98943193d880006721720c8a1f762b8ef646d4dc44cc798a6be25f60c79d2fbb5f13b1121d111a1d7f28922bd68d901e4f7edd0

  • SSDEEP

    768:98KJ3iGkTvH9iz0OyZbOJr6uxVScuKs8k0EB1+S1/yU:9/iGkRkyxeWMVScuKs8k0E1+S1/N

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\mw3\Database\uninstall_qdb.dbd
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2260
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\mw3\Database\uninstall_qdb.dbd
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2952
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\mw3\Database\uninstall_qdb.dbd"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:1644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    1fc203f1e4aab307cebfab9f501a70f5

    SHA1

    a6f5c1a3b5a8dfcd152bba3f3fe74aae136603c7

    SHA256

    6d278919790a40d7e9c59ed6fcc2f8b26c09b487f532c51efa1f32ea68d393a2

    SHA512

    75f60e3bd2b2e053d6288e9743805addc3793360aa0bd087b7b8461032f3463ad7015ef2560cf1fade2a24e0aff6ff19d06ad3154a0ffd8378ff6f9f34a68c9a