Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    14/08/2024, 19:07

General

  • Target

    Area_Solicitud_Imagen_Campo_Rubiales.sbn

  • Size

    132B

  • MD5

    e90859d19d05c6670ce063770c6a7f2d

  • SHA1

    13297db148f1a2e91118f1b8d83cb8df54100ffa

  • SHA256

    29638b66a1d91f0311723dbbf2ccd6fa817dcdc586467c1cd206d68d5e88c6be

  • SHA512

    807e3914f03d88d3888454a7187e3fb1f9e5a15066786d25451e23fe126be4d3d91d1be77c6f70fbadfde82693e1ec1c052cc1c6b578eeaadf340b673878ee71

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Area_Solicitud_Imagen_Campo_Rubiales.sbn
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1440
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Area_Solicitud_Imagen_Campo_Rubiales.sbn
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2792
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Area_Solicitud_Imagen_Campo_Rubiales.sbn"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    bf8b2fc6d0a5ba4a271f2e252de80ffe

    SHA1

    25007007bc7c2301db444383551a69cc3e398c76

    SHA256

    d3aa39a9ee3c8badde5e03d0f299a3cc8a84837d6f3afee90322ff80fa7fa008

    SHA512

    cfa6a06fd41fb5d21f5607424be41871ce12a16db63f26b3f78d37da3ec2286333281b27464473116c36dfb4e51d87f55aaec622cfdd1e02c782dc8c49082394