Resubmissions

04/09/2024, 17:13

240904-vrqntatfmj 3

Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    04/09/2024, 17:13

General

  • Target

    Tsurugi.ahk

  • Size

    6KB

  • MD5

    cf29aafdd76d7900002b306fa8f5fd7c

  • SHA1

    9fe952b29528d47e5ab1d5e35231a53ccc2b6b2f

  • SHA256

    34d625ed4dd22259602e2a8bc88afb1f3429ba96d23c99c0d3fdb70067415f0b

  • SHA512

    535ce79b36599f98859631c0f2c89a27db466d70ee5ad182dc1c803e22bb18469210af4645baa8223db1afbd6d004d6596848d6259a1639cc2509d58c296dc30

  • SSDEEP

    192:IH1Dk4/EGMT0yV5+ZkOyH0Q5JF0qH7mdT8W3qDq+4qC:IHZtByiZXytzC

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Tsurugi.ahk
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Tsurugi.ahk
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2900
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Tsurugi.ahk"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2764

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

          Filesize

          3KB

          MD5

          4de046ea18ca1ec7481af406ca9948e9

          SHA1

          bab5604740e946232661c11331d8d15c05a41b8c

          SHA256

          60d9cfd6159bc0cb3787a5e64d637990e4cf5c95b965976d1017a8e9e2685734

          SHA512

          7b4108e5a46016e9cfd846535cb1fe373f6b01935a5dd455b3866649a15c5a6161b66133d5ede41209d5cbd1f9f12ac623765e9fd5fb3a4ccea9d3440fda258c