Analysis
-
max time kernel
103s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 10:05
Static task
static1
Behavioral task
behavioral1
Sample
751d2ad9a2e5345f494e62045c52d4440ec800743e020d3fa48cd482730c3c43.sh
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
751d2ad9a2e5345f494e62045c52d4440ec800743e020d3fa48cd482730c3c43.sh
Resource
win10v2004-20240802-en
General
-
Target
751d2ad9a2e5345f494e62045c52d4440ec800743e020d3fa48cd482730c3c43.sh
-
Size
1KB
-
MD5
1de99108308f3d5781823342821fcb7e
-
SHA1
e2fb3c2b4608d790cbdc1288aaf22df19d918e37
-
SHA256
751d2ad9a2e5345f494e62045c52d4440ec800743e020d3fa48cd482730c3c43
-
SHA512
4223d6f3635ceac810adcd9a5e428766b524d292abf28909070668f20c47c5cffa06999e155ece442b4df6cdb45d4f01ff1745e506d910710efef5d93c1c6f19
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\sh_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\sh_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.sh rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.sh\ = "sh_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\sh_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\sh_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\sh_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\sh_auto_file\shell\Read rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2176 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2176 AcroRd32.exe 2176 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2752 3012 cmd.exe 30 PID 3012 wrote to memory of 2752 3012 cmd.exe 30 PID 3012 wrote to memory of 2752 3012 cmd.exe 30 PID 2752 wrote to memory of 2176 2752 rundll32.exe 31 PID 2752 wrote to memory of 2176 2752 rundll32.exe 31 PID 2752 wrote to memory of 2176 2752 rundll32.exe 31 PID 2752 wrote to memory of 2176 2752 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\751d2ad9a2e5345f494e62045c52d4440ec800743e020d3fa48cd482730c3c43.sh1⤵
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\751d2ad9a2e5345f494e62045c52d4440ec800743e020d3fa48cd482730c3c43.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\751d2ad9a2e5345f494e62045c52d4440ec800743e020d3fa48cd482730c3c43.sh"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2176
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d8e3cabd3e9d6e7fa77f6d49a7ffcb32
SHA1c8385d73f8b25600b84c33a21cc84b83cc66c9c0
SHA256550b19fa860949aefa85e77cb58b55684f370aea6b3c82b5b153eef215e750b3
SHA51215f928784d94ba449d590e8d83b6d70e6ff528f20312b9f013ed60cfdbcda8c52e038965f2bb2115588b24081cfeed767f3fb67fbf653f80722b6943f2673bd2