Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-09-2024 07:24

General

  • Target

    New folder (5)/Loader/key_format/KeyBINDS.cdn

  • Size

    880B

  • MD5

    3eac8cddf55223d12c4631d1995ab98d

  • SHA1

    c6d2acde556f74d55db441b66b6af6a895f5ecf9

  • SHA256

    0734aad97c0e42f46db7052797944e08813b61e7251fe43300f05aba5febe9eb

  • SHA512

    f05a1c70b0ec532587b59f942d6eca5b989f1f88012636b53e817a52eff4fce85fc7da1479accdb5a8fed71301508289eb18840f8030682e177e15f3546324c9

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\New folder (5)\Loader\key_format\KeyBINDS.cdn"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2400
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\New folder (5)\Loader\key_format\KeyBINDS.cdn
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2868
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\New folder (5)\Loader\key_format\KeyBINDS.cdn"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    f764e7f345557154fc9533b22e98c206

    SHA1

    a7b398ffa1b3f76f058b77a968469234176ebb38

    SHA256

    00f6ea6ee6e58f9ddf01c0338521656b9e15900328c964de904736971e0e0aab

    SHA512

    bd72c89f322f795a71a3ff50933ac03cd4a0c288599c680b19659dba1c52537800da598ec89c8d52398e745c2c30894c5794e000185edee824663a25497ad57d