Analysis

  • max time kernel
    119s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    14/08/2024, 11:37

General

  • Target

    by Vitruv_/DIM-1/data/raids.gz

  • Size

    90B

  • MD5

    ccb5bda2daf39bf7ceea6b21dc9f8692

  • SHA1

    d4c990fc60b555e88bb436bdb2caef238fea1498

  • SHA256

    c9ea1ad3077d07acad75f26598c9eaeec1d799d778717c824098b2c6e0e742af

  • SHA512

    3d4d6bca28664898fc840b51c5e04b77252dcd12eb9e37be9233994934aea6a7942b34765b96ace8cdf3f279e9d0dfb8d789b186c97179d8ff4942429157e2e6

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\by Vitruv_\DIM-1\data\raids.gz"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1544
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\by Vitruv_\DIM-1\data\raids.gz
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2768
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\by Vitruv_\DIM-1\data\raids.gz
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2664
        • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
          "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\by Vitruv_\DIM-1\data\raids.gz"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          PID:2916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    21ba8f2fc4b422fa80e718858837a9d9

    SHA1

    3fbb36a59adefedf66a887b21ca0f829a188a915

    SHA256

    12e958ad46fdd1738d28aabc8cd209836d48951066ffd74140fc0e5d7a619486

    SHA512

    7d33c17870bdb005b8868639b4abb3b97f96b5778585656f893b949e520b0dd18b6944968a2166d9cf68d2ef98995f50ede5da458188c38291737dde9a0ddc3e