Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-09-2024 21:10

General

  • Target

    RiftInstaller.runtimeconfig.json

  • Size

    267B

  • MD5

    8b76a07345e5edceaddb7159c490cf03

  • SHA1

    55911001e04e99dea946e7f43ce73e7caafadc18

  • SHA256

    e8153794edaeb9e9eaf7db83e4cadcbb7963fe410371b2aac828863934d4fada

  • SHA512

    b643ddf46879d524f0410b0fc57c12a76ff8f982bdd78fed247061e15eef342ed57ad59658ba6b1a0177f59e8b6424a0413d8f8c8785ab603b0ae91496273c06

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\RiftInstaller.runtimeconfig.json
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\RiftInstaller.runtimeconfig.json
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2836
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\RiftInstaller.runtimeconfig.json"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    e39f118c15b45b1102496202908e4e99

    SHA1

    155fc938cd63ecc71132ec064d2f79008e7a29aa

    SHA256

    90aa49952b5962f03d755c4e644075b12261001d620b54fa39be1af2d7740fb8

    SHA512

    3601ddc24bde6608bc32385079edd6851eacd3ccaeb6bf52b59d626c377648267c52dc92fc48b39213f6bd33f9f47d0f109b1b9c317c5bf8147718d5bf3bf747