Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-09-2024 05:26

General

  • Target

    entities/bow_arrow_4.behavior.json

  • Size

    2KB

  • MD5

    bb934181405185bf07dabeb587808e81

  • SHA1

    2e707737477b7ffe06fd26f53cdb8511db0b8ace

  • SHA256

    c3e45d569a6bef9567138c04b8790a70dd723e0b887a5c987af65cd91c52c57f

  • SHA512

    15af38bc0b77ae60b1b8b28fbbfdf53f9ddc1c2c675e8ce587add70a357cc447a6aa87291b808834ddbecec3f25d2adf84ee4167a64c38fadecd672ea327646c

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\entities\bow_arrow_4.behavior.json
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:816
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\entities\bow_arrow_4.behavior.json
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2824
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\entities\bow_arrow_4.behavior.json"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    62fc953d9ac5d5977f8acf2a54a003b5

    SHA1

    0d931523443307793a3424ff2a927bced7514a67

    SHA256

    1f47c9867dbc8144b50fa1d86114baf81451b73fff3fb71a495b2367004d0517

    SHA512

    0ab9a0e4adadf9e6b2c870789d59f19861b95d65e3a639d75ef8655e3419ed12de455316f039540f60008c10b2ffdc819576ace852eb00e9a63affef13c5ae71