Analysis
-
max time kernel
840s -
max time network
844s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 12:39
Static task
static1
Behavioral task
behavioral1
Sample
[rutracker.ru].t202539.torrent
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
[rutracker.ru].t202539.torrent
Resource
win10v2004-20240802-en
General
-
Target
[rutracker.ru].t202539.torrent
-
Size
19KB
-
MD5
b8f90499d41d3f0a69c11862cc899012
-
SHA1
ad7a3043cabb1ec589b103a954bb57eb78074b30
-
SHA256
45933444b46854a7b8ba1d1a728e2ff1f953137e3b4d150711abd16bf28ff209
-
SHA512
d94096dc9ccaeb6d8f7946ed71d41d35919054ed6d8600d218c99d77681faf3f699689d9fb4d7bc0e5d37afc6137fc8e630f83521b197c61959c5cab05d1c639
-
SSDEEP
384:bhKXAKjKsusrLxikC6QKqyiDp4IeCAHNR9CXpSDlFumJTAfDwHKtlHS0u07wnsrk:FNS4KqDyT7RA5kemdAfaG9vEnsrne6NS
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\.torrent rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\torrent_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\torrent_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\torrent_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\torrent_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\torrent_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\.torrent\ = "torrent_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\torrent_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2732 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2732 AcroRd32.exe 2732 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1232 wrote to memory of 2112 1232 cmd.exe 31 PID 1232 wrote to memory of 2112 1232 cmd.exe 31 PID 1232 wrote to memory of 2112 1232 cmd.exe 31 PID 2112 wrote to memory of 2732 2112 rundll32.exe 32 PID 2112 wrote to memory of 2732 2112 rundll32.exe 32 PID 2112 wrote to memory of 2732 2112 rundll32.exe 32 PID 2112 wrote to memory of 2732 2112 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\[rutracker.ru].t202539.torrent1⤵
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\[rutracker.ru].t202539.torrent2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\[rutracker.ru].t202539.torrent"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2732
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5bfea4d729d9b0b89431be7d9ed7ddf99
SHA118c202bd44522b2c2b8204b038b641fdf05b4ff3
SHA256405140dcef52d573dbf6017901eb03e37e93d571d9ef915e745926a547f2afff
SHA5125c84cfbecf0af9a5fe2693bbb8ca9a2ae764f17c3e6a3c6f26423400129acd0b5a23e4102f3779095da0d6ea6849895a3c0f756f10ab3a6c98987804102d2401