Analysis

  • max time kernel
    122s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-09-2024 12:21

General

  • Target

    bin/minimize.cfg

  • Size

    202B

  • MD5

    584078def15682c4984cd4e4351253fd

  • SHA1

    a2eb3eff79c2d0a4c76e8146bc6cf31fc64d200a

  • SHA256

    c9c2b8de91fe8e0034b07c7eabcce35977e6e8695453778f323faf731cd896c5

  • SHA512

    2cce04e0c2a066ddfadae99fe0bfa0197b7c1c685694eb64041e4470ffd5dfe0ce9fc8d7a75e30bd3fd24ac3e52df4b0347d4fa3a1acd5b7e926cd719a5896f2

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\bin\minimize.cfg
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2724
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bin\minimize.cfg
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2708
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\bin\minimize.cfg"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    a4fbb6311a377900d41bdd44b33e91ae

    SHA1

    ef691cf3db9d15f699d00dbed839e70f53e4674b

    SHA256

    7a4bc1b89bb24af15f3ef6c113a4afaf0fa0878bf01bdb1dc2a2c51b2a2fa688

    SHA512

    88365349f8be4b2934d4abec76508df1844dcb08a96a865db486ba4756e69bea8e2869aa65039e53c0b36379cb202c3ce6054094bf25aab300d328f45d65cee4