Resubmissions

06-09-2024 12:39

240906-pvywpswgjr 3

06-09-2024 12:36

240906-ptdt5sxckf 3

Analysis

  • max time kernel
    840s
  • max time network
    844s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    06-09-2024 12:39

General

  • Target

    [rutracker.ru].t202539.torrent

  • Size

    19KB

  • MD5

    b8f90499d41d3f0a69c11862cc899012

  • SHA1

    ad7a3043cabb1ec589b103a954bb57eb78074b30

  • SHA256

    45933444b46854a7b8ba1d1a728e2ff1f953137e3b4d150711abd16bf28ff209

  • SHA512

    d94096dc9ccaeb6d8f7946ed71d41d35919054ed6d8600d218c99d77681faf3f699689d9fb4d7bc0e5d37afc6137fc8e630f83521b197c61959c5cab05d1c639

  • SSDEEP

    384:bhKXAKjKsusrLxikC6QKqyiDp4IeCAHNR9CXpSDlFumJTAfDwHKtlHS0u07wnsrk:FNS4KqDyT7RA5kemdAfaG9vEnsrne6NS

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\[rutracker.ru].t202539.torrent
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1232
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\[rutracker.ru].t202539.torrent
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2112
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\[rutracker.ru].t202539.torrent"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    bfea4d729d9b0b89431be7d9ed7ddf99

    SHA1

    18c202bd44522b2c2b8204b038b641fdf05b4ff3

    SHA256

    405140dcef52d573dbf6017901eb03e37e93d571d9ef915e745926a547f2afff

    SHA512

    5c84cfbecf0af9a5fe2693bbb8ca9a2ae764f17c3e6a3c6f26423400129acd0b5a23e4102f3779095da0d6ea6849895a3c0f756f10ab3a6c98987804102d2401