Resubmissions

30-08-2024 17:58

240830-wkhv3axbkh 8

30-08-2024 17:38

240830-v7p28axcnp 3

30-08-2024 17:34

240830-v5fe1awcrh 1

30-08-2024 17:29

240830-v2wykswbrf 8

30-08-2024 17:24

240830-vywteawape 8

30-08-2024 17:19

240830-vvtvmsvhlg 8

Analysis

  • max time kernel
    110s
  • max time network
    21s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    30-08-2024 17:38

General

  • Target

    pop-support_1665955296.tar

  • Size

    1.4MB

  • MD5

    8ce450f1dab04d0043d8223c22696e73

  • SHA1

    1854c2a80fc385e3af924c7e0c7cec1e8759970f

  • SHA256

    e5d51189584e81f711ef12b9d2a94cac86e961dad010ecba4d4dab357f230c02

  • SHA512

    d679e151bc6f9ceb30f02bab8a1fe9f9c8eada68ba9efa28301a4b11c2c3db939d8ddbbc36980beb7998c8c3d5cec02e44fbad868966a1468e71de1a9fe01b3e

  • SSDEEP

    12288:B4YYtv93s9172essh1GrJGC3vDpubp0xXvQyYwB6bUXFahjCQMTdmLkY7CWFsqnz:B4YYtv93s9172essDkX8WQkm3

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\pop-support_1665955296.tar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2556
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\pop-support_1665955296.tar
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2212
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\pop-support_1665955296.tar
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2952
        • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
          "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\pop-support_1665955296.tar"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          PID:1160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    d24d4f440c7d504345ea99eae06788cf

    SHA1

    dba51360f5ee77ee9bb0761b6860f3fb6df2e1a3

    SHA256

    a37764192d79186b76d72847c7311a749c80f5dce9e9d24317a87af8172d943f

    SHA512

    d7415f3576966338af9044a1378e10b1aba7fb065a694848d076c1a0eba9b1f5383c45e3e80d20141d1fea7e90bdd79f77095e26590d02b069f1469e91435723