Overview
overview
3Static
static
1certbash.zip
windows7-x64
1certbash.zip
windows10-2004-x64
1.bash_history
windows7-x64
3.bash_history
windows10-2004-x64
3.bash_logout
windows7-x64
3.bash_logout
windows10-2004-x64
3.bashrc
windows7-x64
3.bashrc
windows10-2004-x64
3.profile
windows7-x64
3.profile
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30-08-2024 17:13
Static task
static1
Behavioral task
behavioral1
Sample
certbash.zip
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
certbash.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
.bash_history
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
.bash_history
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
.bash_logout
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
.bash_logout
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
.bashrc
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
.bashrc
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
.profile
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
.profile
Resource
win10v2004-20240802-en
General
-
Target
.bash_history
-
Size
30B
-
MD5
cd41a63f10a40680b3f60d5fc67af9db
-
SHA1
2aee20db5e38cbad53d26001025604dcb7643cf3
-
SHA256
7032a698c8561c88a6413cfdf4ee82994424f0bb78516b9c75972ee96890c354
-
SHA512
60b575fa7b76f05dd096f163c5b645abcd9b64bf961dbd73e6a81f38506ef1b39935dd3e4e16947d30d4c2ec2e5c2f4c50b90e8393dc30b7ed0ed731f20c7bff
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\bash_history_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\bash_history_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\bash_history_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\bash_history_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\.bash_history rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\.bash_history\ = "bash_history_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\bash_history_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\bash_history_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2816 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
AcroRd32.exepid process 2816 AcroRd32.exe 2816 AcroRd32.exe 2816 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2348 wrote to memory of 2916 2348 cmd.exe rundll32.exe PID 2348 wrote to memory of 2916 2348 cmd.exe rundll32.exe PID 2348 wrote to memory of 2916 2348 cmd.exe rundll32.exe PID 2916 wrote to memory of 2816 2916 rundll32.exe AcroRd32.exe PID 2916 wrote to memory of 2816 2916 rundll32.exe AcroRd32.exe PID 2916 wrote to memory of 2816 2916 rundll32.exe AcroRd32.exe PID 2916 wrote to memory of 2816 2916 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\.bash_history1⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\.bash_history2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\.bash_history"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2816
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD55f28a2d04756a6d630620df1829fb6bc
SHA11960428309291a5ed4aca8a6845b979fda6232d9
SHA256f529efa068aeb0f16f94ffb772fcfd927297d9295402c40f51226ec0781f08a7
SHA512f5f4e0513daa325edd86ba175a8c43a09db96806cd45da9744419f0eb7af50159bc4604bed28479319b036e28a906794f3b5baf124f98f8aff8337048a4d2149