Analysis

  • max time kernel
    103s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-09-2024 01:33

General

  • Target

    9869cd31d02c3aa087864af6d657c266977210ed24c4f9b9bdcae4fb94013035.unknown

  • Size

    24KB

  • MD5

    a96610c81f16c3a0d9aa521b6f0704a1

  • SHA1

    9d2aa80bf8a1c8289f7e7e33338f6b1d17b9c5cf

  • SHA256

    9869cd31d02c3aa087864af6d657c266977210ed24c4f9b9bdcae4fb94013035

  • SHA512

    e8d0679655d85f10cf00f00e59fd3dae9705a2c5ec1dc41ba8f6bb7c38e667746750775f9f0127de4a00f11b073f6f3d3e8f6b77f81ab9fdd475a11e6af50fcf

  • SSDEEP

    192:r8oK3rcd5kM7ffi4UMF1pkOvpF3EiRcx+NSzfxmrmE76tNY2pCumJ0pQrXVjavmn:gGekfnVxVNOmrmEu3YcrmSpC1n

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\9869cd31d02c3aa087864af6d657c266977210ed24c4f9b9bdcae4fb94013035.unknown
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1424
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\9869cd31d02c3aa087864af6d657c266977210ed24c4f9b9bdcae4fb94013035.unknown
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2780
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\9869cd31d02c3aa087864af6d657c266977210ed24c4f9b9bdcae4fb94013035.unknown"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    976eac04e6218517413a99dad417beed

    SHA1

    dd780673bef4de1468bf121acd77724c3ea08b78

    SHA256

    6b86db91c590c63781fba05fd1c2a9f2d058c9368fa59fd9a9054ec5b951d158

    SHA512

    aa905ac83a5d9bc352f0797583985bdac7d354eb17eba2de4d7f791964af1dfeec89ba3f53b5cf4c71ea6538bc1822e50e66c13bb1ffac9c8f6ba442c38eefe7