Analysis
-
max time kernel
103s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 01:33
Behavioral task
behavioral1
Sample
9869cd31d02c3aa087864af6d657c266977210ed24c4f9b9bdcae4fb94013035.unknown
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9869cd31d02c3aa087864af6d657c266977210ed24c4f9b9bdcae4fb94013035.unknown
Resource
win10v2004-20240802-en
General
-
Target
9869cd31d02c3aa087864af6d657c266977210ed24c4f9b9bdcae4fb94013035.unknown
-
Size
24KB
-
MD5
a96610c81f16c3a0d9aa521b6f0704a1
-
SHA1
9d2aa80bf8a1c8289f7e7e33338f6b1d17b9c5cf
-
SHA256
9869cd31d02c3aa087864af6d657c266977210ed24c4f9b9bdcae4fb94013035
-
SHA512
e8d0679655d85f10cf00f00e59fd3dae9705a2c5ec1dc41ba8f6bb7c38e667746750775f9f0127de4a00f11b073f6f3d3e8f6b77f81ab9fdd475a11e6af50fcf
-
SSDEEP
192:r8oK3rcd5kM7ffi4UMF1pkOvpF3EiRcx+NSzfxmrmE76tNY2pCumJ0pQrXVjavmn:gGekfnVxVNOmrmEu3YcrmSpC1n
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\unknown_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\.unknown\ = "unknown_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\unknown_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\unknown_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\unknown_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\.unknown rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\unknown_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\unknown_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2664 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2664 AcroRd32.exe 2664 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1424 wrote to memory of 2780 1424 cmd.exe 30 PID 1424 wrote to memory of 2780 1424 cmd.exe 30 PID 1424 wrote to memory of 2780 1424 cmd.exe 30 PID 2780 wrote to memory of 2664 2780 rundll32.exe 31 PID 2780 wrote to memory of 2664 2780 rundll32.exe 31 PID 2780 wrote to memory of 2664 2780 rundll32.exe 31 PID 2780 wrote to memory of 2664 2780 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\9869cd31d02c3aa087864af6d657c266977210ed24c4f9b9bdcae4fb94013035.unknown1⤵
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\9869cd31d02c3aa087864af6d657c266977210ed24c4f9b9bdcae4fb94013035.unknown2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\9869cd31d02c3aa087864af6d657c266977210ed24c4f9b9bdcae4fb94013035.unknown"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2664
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5976eac04e6218517413a99dad417beed
SHA1dd780673bef4de1468bf121acd77724c3ea08b78
SHA2566b86db91c590c63781fba05fd1c2a9f2d058c9368fa59fd9a9054ec5b951d158
SHA512aa905ac83a5d9bc352f0797583985bdac7d354eb17eba2de4d7f791964af1dfeec89ba3f53b5cf4c71ea6538bc1822e50e66c13bb1ffac9c8f6ba442c38eefe7