Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    13/08/2024, 23:08

General

  • Target

    OverflowRust-master/.gitignore

  • Size

    1KB

  • MD5

    aed0e66448e22420930cb1d4151bef4d

  • SHA1

    6511eb993ba6b09d60e43845cbae7a23a26c4134

  • SHA256

    aa71061c8add0e8e8cbd718cabef23c3d0ef06753231345ebe1117f3474ec500

  • SHA512

    f214ec87eba8b08128fcc3d8d56809f2847afb570280c5de2a70a5f6a74fb57b2acc6cb1ee3b4897e2c74340310ef17f90052870d9a55a7aae5a97d494b171ff

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\OverflowRust-master\.gitignore
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2352
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\OverflowRust-master\.gitignore
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3040
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\OverflowRust-master\.gitignore"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2804

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

          Filesize

          3KB

          MD5

          a21b69fd5fda6ff3fe8a5b1970e441b9

          SHA1

          c76019454112aef0b148bd97a8b5bfb5a76746e3

          SHA256

          161985b227fc0b609e158bc10c992b3d3c3019c26cbb6da544d6bfbe9cdd1b4b

          SHA512

          87b61b08519c53aff4955da1c6b266d2164671b9a80c2327e3e5db72938e0bc407ad1c2afcf023d99fef8c6bc667e69d46d156bfaa5a2b3a532b97222cc4619e