Analysis
-
max time kernel
842s -
max time network
842s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
16-08-2024 17:08
Static task
static1
Behavioral task
behavioral1
Sample
ATDKM0-019002993PDF/ATDKM0-019002993PDF.url
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ATDKM0-019002993PDF/ATDKM0-019002993PDF.url
Resource
win10v2004-20240802-en
General
-
Target
ATDKM0-019002993PDF/ATDKM0-019002993PDF.url
-
Size
171B
-
MD5
012a6bc70079bc296c3e5da75986d6e2
-
SHA1
6d169e6194f439555eb7b9f2e03008e3714651e6
-
SHA256
d3565b730ffcf5a95d21facb031eafd5be65664f5c2949e996a7355fd9685550
-
SHA512
2f72c8851c3cbfc6c7abb2387f41ecec931733b18c8fc0e5fd2add5d8711851efe297b1a6ff6ed30cf65d1a2d15a4658fa60bb72411d3ff16d98e9992d2838e2
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3048 rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2672 msdt.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2488 3048 rundll32.exe 31 PID 3048 wrote to memory of 2488 3048 rundll32.exe 31 PID 3048 wrote to memory of 2488 3048 rundll32.exe 31 PID 2488 wrote to memory of 2672 2488 rundll32.exe 32 PID 2488 wrote to memory of 2672 2488 rundll32.exe 32 PID 2488 wrote to memory of 2672 2488 rundll32.exe 32
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\ATDKM0-019002993PDF\ATDKM0-019002993PDF.url1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" ndfapi.dll,NdfRunDllDiagnoseWithAnswerFile NetworkDiagnosticsSharing C:\Users\Admin\AppData\Local\Temp\NDF14A9.tmp2⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\system32\msdt.exe-skip TRUE -path C:\Windows\diagnostics\system\networking -af C:\Users\Admin\AppData\Local\Temp\NDF14A9.tmp -ep NetworkDiagnosticsSharing3⤵
- Suspicious use of FindShellTrayWindow
PID:2672
-
-
-
C:\Windows\System32\sdiagnhost.exeC:\Windows\System32\sdiagnhost.exe -Embedding1⤵PID:2496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\ElevatedDiagnostics\460911090\2024081617.000\NetworkDiagnostics.0.debugreport.xml
Filesize64KB
MD5e959ecbd94bac59e67dbb5743a332c89
SHA1ee566f11be792497931e85dfa8ef768958eab29b
SHA2563ebbebf9a8744085a7b4e1343f23b8fe8097d44a3ed22aa764d5a1c6d8016c0c
SHA512a8a20dddd32f86fdb0df66a139896a68ec9d94a6f10699c1d0698058fa826975fe5b598b48ff46f3b8a98e433ed1a67dbeae1fdb283a40584a9ee36b8ff1a8b9
-
Filesize
2KB
MD5edffb30992fd20c50d4a9efa2b235173
SHA130fe67fec4d0caa037767b1976188ef43d94a2b7
SHA2560ff3b98e3a01d1c24d5d1fe7bc583a1dd65bfaf831551d0d9f84ad6b4412eeda
SHA5122d79bf84beda123ce2d3514251b3488417423d01b6dc5f51f42424a443c7b2beb52df88de59d45e81e5da0864f4ac3353b99be1a2da70579afff759c809fecc2
-
Filesize
23KB
MD51d192ce36953dbb7dc7ee0d04c57ad8d
SHA17008e759cb47bf74a4ea4cd911de158ef00ace84
SHA256935a231924ae5d4a017b0c99d4a5f3904ef280cea4b3f727d365283e26e8a756
SHA512e864ac74e9425a6c7f1be2bbc87df9423408e16429cb61fa1de8875356226293aa07558b2fafdd5d0597254474204f5ba181f4e96c2bc754f1f414748f80a129
-
Filesize
52KB
MD52f7c3db0c268cf1cf506fe6e8aecb8a0
SHA1fb35af6b329d60b0ec92e24230eafc8e12b0a9f9
SHA256886a625f71e0c35e5722423ed3aa0f5bff8d120356578ab81a64de2ab73d47f3
SHA512322f2b1404a59ee86c492b58d56b8a6ed6ebc9b844a8c38b7bb0b0675234a3d5cfc9f1d08c38c218070e60ce949aa5322de7a2f87f952e8e653d0ca34ff0de45
-
Filesize
2KB
MD50c75ae5e75c3e181d13768909c8240ba
SHA1288403fc4bedaacebccf4f74d3073f082ef70eb9
SHA256de5c231c645d3ae1e13694284997721509f5de64ee5c96c966cdfda9e294db3f
SHA5128fc944515f41a837c61a6c4e5181ca273607a89e48fbf86cf8eb8db837aed095aa04fc3043029c3b5cb3710d59abfd86f086ac198200f634bfb1a5dd0823406b
-
Filesize
5KB
MD5dc9be0fdf9a4e01693cfb7d8a0d49054
SHA174730fd9c9bd4537fd9a353fe4eafce9fcc105e6
SHA256944186cd57d6adc23a9c28fc271ed92dd56efd6f3bb7c9826f7208ea1a1db440
SHA51292ad96fa6b221882a481b36ff2b7114539eb65be46ee9e3139e45b72da80aac49174155483cba6254b10fff31f0119f07cbc529b1b69c45234c7bb61766aad66
-
Filesize
478KB
MD54dae3266ab0bdb38766836008bf2c408
SHA11748737e777752491b2a147b7e5360eda4276364
SHA256d2ff079b3f9a577f22856d1be0217376f140fcf156e3adf27ebe6149c9fd225a
SHA51291fb8abd1832d785cd5a20da42c5143cd87a8ef49196c06cfb57a7a8de607f39543e8a36be9207842a992769b1c3c55d557519e59063f1f263b499f01887b01b
-
Filesize
13KB
MD51ccc67c44ae56a3b45cc256374e75ee1
SHA1bbfc04c4b0220ae38fa3f3e2ea52b7370436ed1f
SHA256030191d10ffb98cecd3f09ebdc606c768aaf566872f718303592fff06ba51367
SHA512b67241f4ad582e50a32f0ecf53c11796aef9e5b125c4be02511e310b85bdfa3796579bbf3f0c8fe5f106a5591ec85e66d89e062b792ea38ca29cb3b03802f6c6