Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-09-2024 04:42

General

  • Target

    $PLUGINSDIR/app-64.7z

  • Size

    77.6MB

  • MD5

    cf3fcaf040815b89dffee1ff2b653544

  • SHA1

    20da906afe08ac4ffd0903a882a2003bc9252653

  • SHA256

    70106fafcb522ba8fb9bdbf47368addbc778455edb6a8cc6efaf270bf65b9241

  • SHA512

    0a11d55fefd0d38bad72c3e5cf39f9730fbf8c0e9deed697e908d1f1b3ca0b1112ebcaacdd99b388ed259a976cd4f7c7ca4cc5d12334d231643a985caab268c5

  • SSDEEP

    1572864:wgNzwtkFlWo6FUT9EFL0ofl+xiJP5pG7P0AvXPbNN:wgNU7+KL0ul+3P0AxN

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2364
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2892
        • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
          "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          PID:2752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    52a3be9e18b88ee3d74dee7220b757f0

    SHA1

    3e30f5ed581dd5d9652770ac6db1a3741537f16c

    SHA256

    c32a2244f3c49230c0c196e37f648542db3f995cbf1fd7c289a430d60f989b88

    SHA512

    93f50ec62ba9582c5087f5fcd23dc7a1544ab695bd4bbd2909c207e2ace2a1d66e4b40b6379d745b456d43cdccaaa9d867710bdbb9e5ba58118c6da51dc668b4