Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 14:55
Static task
static1
Behavioral task
behavioral1
Sample
YNK1PC104_2024-08-20_14_51_59.343.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
YNK1PC104_2024-08-20_14_51_59.343.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Device/HarddiskVolume3/Users/radam/Downloads/Update.js
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Device/HarddiskVolume3/Users/radam/Downloads/Update.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
manifest.json
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
manifest.json
Resource
win10v2004-20240802-en
General
-
Target
manifest.json
-
Size
243B
-
MD5
8fe292f057c853fdd2897742cfe63592
-
SHA1
f9d65917437c1dfcd476a6fa62fa95061da6e6b4
-
SHA256
42ba9f88c6fffabc9bd304474596df586cd52efda1d960dbf086f577d02ac15d
-
SHA512
a65ac69dba971a610a0882fca8acac434673d06a03c714c4795a491a3674e5fc7967ec2cf107a89cbc53ae1a6191cd8f1bf28bb210d26bb73f1707296714212c
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\json_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\.json rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\json_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\json_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\json_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\.json\ = "json_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\json_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\json_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2440 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2440 AcroRd32.exe 2440 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2404 2232 cmd.exe 29 PID 2232 wrote to memory of 2404 2232 cmd.exe 29 PID 2232 wrote to memory of 2404 2232 cmd.exe 29 PID 2404 wrote to memory of 2440 2404 rundll32.exe 30 PID 2404 wrote to memory of 2440 2404 rundll32.exe 30 PID 2404 wrote to memory of 2440 2404 rundll32.exe 30 PID 2404 wrote to memory of 2440 2404 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\manifest.json1⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\manifest.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\manifest.json"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2440
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b3eae75d52539ed76d0133c328b05762
SHA1db71f2d5a72b6328aa34f10a7ce161428e12e3f1
SHA256c313c06b73db25b3366107bd1641d69a1037e86c46bac924220f5d309fef9769
SHA512c626e0bfb9f7de6bff909c1d2eb6bc6ecc54884c8bb0965d33119564b1315561e54822e69abba3b4407d7d5742874db1b1467f3dfa6ad289b265dd15eaa46d03