Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    30-08-2024 17:13

General

  • Target

    .bash_history

  • Size

    30B

  • MD5

    cd41a63f10a40680b3f60d5fc67af9db

  • SHA1

    2aee20db5e38cbad53d26001025604dcb7643cf3

  • SHA256

    7032a698c8561c88a6413cfdf4ee82994424f0bb78516b9c75972ee96890c354

  • SHA512

    60b575fa7b76f05dd096f163c5b645abcd9b64bf961dbd73e6a81f38506ef1b39935dd3e4e16947d30d4c2ec2e5c2f4c50b90e8393dc30b7ed0ed731f20c7bff

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\.bash_history
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2348
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\.bash_history
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2916
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\.bash_history"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    5f28a2d04756a6d630620df1829fb6bc

    SHA1

    1960428309291a5ed4aca8a6845b979fda6232d9

    SHA256

    f529efa068aeb0f16f94ffb772fcfd927297d9295402c40f51226ec0781f08a7

    SHA512

    f5f4e0513daa325edd86ba175a8c43a09db96806cd45da9744419f0eb7af50159bc4604bed28479319b036e28a906794f3b5baf124f98f8aff8337048a4d2149