Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-09-2024 01:46

General

  • Target

    411ab9a6714b6092a7d5b7631e51f8920cfbf026713a86ba2aef932f2e16315f.unknown

  • Size

    24KB

  • MD5

    eaf53d2a1a7147825b0bc108d8d5d120

  • SHA1

    a35f816c43593416bad26abe37d96270369f4581

  • SHA256

    411ab9a6714b6092a7d5b7631e51f8920cfbf026713a86ba2aef932f2e16315f

  • SHA512

    887f25c8a393b79720c0a5db144f645dcf5644e79c1ee988bd538b24a42cd1bbe0eebed1003c04b0f29933e0b62372cb5001669beca82aa8401f36db15675d70

  • SSDEEP

    192:r8oK3rcd5kM7ffi4UMF1pkOvpF3EiRcx+NSzfxmrmE76tNY2pCumJ0pQrXVjavmh:gGekfnVxVNOmrmEu3YcrmSpC1h

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\411ab9a6714b6092a7d5b7631e51f8920cfbf026713a86ba2aef932f2e16315f.unknown
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\411ab9a6714b6092a7d5b7631e51f8920cfbf026713a86ba2aef932f2e16315f.unknown
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2976
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\411ab9a6714b6092a7d5b7631e51f8920cfbf026713a86ba2aef932f2e16315f.unknown"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    a08fcd46427091c2b4eafdc7b53cae66

    SHA1

    3ae41e9e358acfcf7788aea219c266446bbf6cf7

    SHA256

    18196ddabe9a74c0445cc5e4fdf73a06cb20dec30fdb6524c79df80ac6be9aaa

    SHA512

    4ce66158bb228ebb65bafc9b27c284da2b56e8eb177ebfa2f8d2ac56e9181b6255f7b4e870a370df5df884ef76153d32359961559b2e85851baff70a709d9caf