Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 10:55
Static task
static1
Behavioral task
behavioral1
Sample
cd86875944e109e90384c07eac5c53e02b7497174412aee3ab1cc32081aa2311.sh
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
cd86875944e109e90384c07eac5c53e02b7497174412aee3ab1cc32081aa2311.sh
Resource
win10v2004-20240802-en
General
-
Target
cd86875944e109e90384c07eac5c53e02b7497174412aee3ab1cc32081aa2311.sh
-
Size
1KB
-
MD5
cb86326265699dea300bf75db66d160f
-
SHA1
d69d51cfd1bd0a2b8e6620df90299221a5db1274
-
SHA256
cd86875944e109e90384c07eac5c53e02b7497174412aee3ab1cc32081aa2311
-
SHA512
2c09a431ed697765a62623c354b571c42b975cbc8db9178b6305cfd27ed9539d1fb594d26defe39d7dda9bbe461c62f4b2f1ce8acacfb52641e101a6499120ba
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\.sh\ = "sh_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\sh_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\sh_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\sh_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\.sh rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\sh_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\sh_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\sh_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2804 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2804 AcroRd32.exe 2804 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2264 1688 cmd.exe 31 PID 1688 wrote to memory of 2264 1688 cmd.exe 31 PID 1688 wrote to memory of 2264 1688 cmd.exe 31 PID 2264 wrote to memory of 2804 2264 rundll32.exe 32 PID 2264 wrote to memory of 2804 2264 rundll32.exe 32 PID 2264 wrote to memory of 2804 2264 rundll32.exe 32 PID 2264 wrote to memory of 2804 2264 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\cd86875944e109e90384c07eac5c53e02b7497174412aee3ab1cc32081aa2311.sh1⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\cd86875944e109e90384c07eac5c53e02b7497174412aee3ab1cc32081aa2311.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\cd86875944e109e90384c07eac5c53e02b7497174412aee3ab1cc32081aa2311.sh"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2804
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5711c44b96b2189f42b2eb2455ca05e73
SHA19ed7dcd0b5c8bdd06f49b69062aca6e77e26ff97
SHA256be65d3462e57de1c8d4b744c668fc80bcc9f5cd4a86ec4f8797b41648b26581a
SHA5128abdfc8ceb5d14e4eea9773462bbe72907b75580b7a8ae0111907eecda178a391c6610fe6683e122d0575c5d370f7d211f185b87a450f13a1928fbe1d8244c5e