Analysis

  • max time kernel
    122s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    14/08/2024, 11:37

General

  • Target

    by Vitruv_/advancements/f0a296ad-383d-4ddc-a388-586f3304767f.json

  • Size

    593B

  • MD5

    3d3ca94a4f6357a36a993ec3ca6883fe

  • SHA1

    05b9dac5022f96269f9fb821095e16f7240e3cbe

  • SHA256

    303a278193fee89acb3a09a2d28abbce150d197a891a9f621c8889791be40752

  • SHA512

    2bcc2c5604a0fd405995fc7d902f03127498f5c6c340d41fcf252b39fb821598329127764b4e3c0cf34a6c85bdfccd2f0f9fd30d5d8ca8870abfc1a5c53999e1

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\by Vitruv_\advancements\f0a296ad-383d-4ddc-a388-586f3304767f.json"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1524
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\by Vitruv_\advancements\f0a296ad-383d-4ddc-a388-586f3304767f.json
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2668
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\by Vitruv_\advancements\f0a296ad-383d-4ddc-a388-586f3304767f.json"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2208

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    65f0d447e8c79b8d096ba2b225d4be56

    SHA1

    c21f9eca19851ed243661563511d266433a31d72

    SHA256

    4868094f413f1e60016dbc23bdb4fd80e5e542b7fe5f9e6477c4e424a042dc65

    SHA512

    ecd93ea373fded9d0e8f3af7d9366d6ab283b4ca2b6bf6eb2e9e55db82565c804cc0caaf1123bb79bd6a3a9e4c4963075a1d40762f17391b5fd9933aec9b6efa