Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-09-2024 05:26

General

  • Target

    entities/Dragon Agua/water_dragon_breath_controlled.behavior.json

  • Size

    2KB

  • MD5

    5192cce8de9170a7a4792e434a13fa3f

  • SHA1

    f1f7a2ab7cdaa80d668a833f445756d8f389070a

  • SHA256

    01ffe68707dda60855a1291d318537fc8dd27a62da1ff24a22824fa389527ef9

  • SHA512

    87ea530eb5367edfb7ecf41c59da3bae6b77ca7584caee3c20af71719e088fa9df917cf9939243f856da4c595f4e2e02f1ceb99ebb1b3fa5cd9c4ed7a21e7d46

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\entities\Dragon Agua\water_dragon_breath_controlled.behavior.json"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2600
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\entities\Dragon Agua\water_dragon_breath_controlled.behavior.json
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2488
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\entities\Dragon Agua\water_dragon_breath_controlled.behavior.json"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    55d42c8dc6cb481f16c2bed135806213

    SHA1

    7dea318cee9efd62abb94991d4e5175d51686a2b

    SHA256

    24fe1feee3aceaec7eae245f04e54ad749b4a20f13c8f2e86f8899c4f93e6684

    SHA512

    c607932849b0a6f2720c0de75e072d709f2e4f3b8ba8a3485aa159905125a5a12f318f479d73ac585dcf50d6790b0dab165be53c8b905afc9cd4f8164eb0db96