Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02-09-2024 17:37

General

  • Target

    Solara/Debug/DebugPPT.tmp

  • Size

    11KB

  • MD5

    4969578a5fd8d113ab7783812849c1ed

  • SHA1

    580f84362a74337b2ed25bd58700e9a002e51bc9

  • SHA256

    9f2b02ba814c2975a7b6ed5aa03345046a9c9d3036481a8a109b132a951e82a0

  • SHA512

    49dc150be750ff0a5b03fbe384debcc136d6dad513fa1c6284469de8e8aed1b865b2bd8271937030818094bcc5358dde6e146e3c784dd88fa9681a84c7a557ef

  • SSDEEP

    192:W7F8knwe/KZztz2XFuUpcWOEai+S7UeAJo9pDWhuDyG/WE8cHtENQmfsB:WNn1y1p2XMUpcWb+qUerShuDl+8HerfQ

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Solara\Debug\DebugPPT.tmp
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Solara\Debug\DebugPPT.tmp
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2772
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Solara\Debug\DebugPPT.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    58f648aba3736de1da97c362d9cdbdff

    SHA1

    6e0e4be3c77628da427b808b862db34b36657f13

    SHA256

    46b451785c73aa304de69630e820f0e9963903ad616b068a75863db32fd8a62f

    SHA512

    953e7a17d9f9d36262d412f7cf4b52c2c4321eb4a1ae31df283810606f09f36880b745bc10b41248790f07383262d45f6d01ca4123c800ff8dc70dbeaf3fd455