Resubmissions

30-08-2024 17:58

240830-wkhv3axbkh 8

30-08-2024 17:38

240830-v7p28axcnp 3

30-08-2024 17:34

240830-v5fe1awcrh 1

30-08-2024 17:29

240830-v2wykswbrf 8

30-08-2024 17:24

240830-vywteawape 8

30-08-2024 17:19

240830-vvtvmsvhlg 8

Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    30-08-2024 17:38

General

  • Target

    pop-support_1665955296.tar.xz

  • Size

    114KB

  • MD5

    38e7f80dc166d6d6aff669957117ac83

  • SHA1

    066768f5af983a33521fd9089b6d7917c574b7c7

  • SHA256

    0367f81c2dfae13d02e71c66cbf58f8d5881aac85935d41acd058f7a63fefb3f

  • SHA512

    f966b5f6a4b2241ca3160e3f4a54532168ffe64b381b723323b9db7b4177bd948e2629b009c9562f14a49f6eba93e186d32e74dee97f29ad38d11a713151c59e

  • SSDEEP

    1536:mKEqnLRocVkw6uuQoX9sPrZIZDBoJIMFaKv6wim5hxQrKUwmpHX4ETLBkZHFwpH6:FEqdcw62oKFQ1itaxk5bAKUnXnBM6I

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\pop-support_1665955296.tar.xz
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2704
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\pop-support_1665955296.tar.xz
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2900
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\pop-support_1665955296.tar.xz"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    080ad7143f1c4204bb9bb0e7fbf3e473

    SHA1

    6251e01fec3e74cf8415b118862ef36ff2704b4a

    SHA256

    33ea292488b186ce4f266bff9ea9b16123e7e37c9581c421c74b60b309d15ead

    SHA512

    28214732c760c2502a7317e46ce26565e73aaaec117b3b201cd585af49537ebe3db3a8c648231c2103d4661eda5bd3ad19af6f070831b004064a306d1ac91009