Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 17:33

General

  • Target

    version.dat

  • Size

    12.0MB

  • MD5

    3a43bf84db7c06571f932b32c8e45d4c

  • SHA1

    4d51d9385107ba98f0b3dafc12a5c8c4d3bd0846

  • SHA256

    eb2d24b5c941c1a081076f2d31ece01d97f3d1ce5b3df22105a6a21b8a4932bd

  • SHA512

    f72e8dffc2162d52f0bce05986418a61952cc567ac5f9b3f575b6dfe11832fc1f14e80f3cf68ba5313e70bfd7e5e1d6ce7c76eb9f7a85493c4031fdea09fe323

  • SSDEEP

    393216:xMAnhGpSDbURuocn9bpbeWk8eSYkvEgvDtUySD7mVNbT1cUbPB5QBzBlFNBiRRi4:uu1cUbpqN7iRRx95qDS

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\version.dat
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\version.dat
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2912
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\version.dat"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    424d19a7c74b893212c6ef34a2405f7a

    SHA1

    7d799eef474733e2bd3a8c1e68504145f25180b0

    SHA256

    ea7a4cf1cd8393073dd07e4cca6b1d67bad73ff96197287c82814e9b38deed8c

    SHA512

    f9d6bb57242ad85ecf09b022b83d0b199803aa40ddfba35e9fd19e7b9978f45dfb5b5f58535ac0dff7c4e91013d6af0078473d635916299a114eb2bb9318ddac