Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 15:56
Static task
static1
Behavioral task
behavioral1
Sample
Factura (8).tar.lz
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Factura (8).tar.lz
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
sample.tar
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
sample.tar
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Factura.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Factura.exe
Resource
win10v2004-20240802-en
General
-
Target
Factura (8).tar.lz
-
Size
588KB
-
MD5
53baf5c9a0c8b13cb0bbdca4cd7cc025
-
SHA1
3bd3e1996c64620f83a64c826708c33beedcc14f
-
SHA256
207470c31aebb98487d019c4ca219f77be687bca6c704321066f6b6f31c58d25
-
SHA512
d712c8d8536555fe420b3a1851c73c8ece0c9dcbf9c583b8a003c76a05392828a8dc9b41bc35443bbdec9a7346df5d5d495c8a839a9c6d4941cdcf051c584068
-
SSDEEP
12288:Ur52lfmBF12lYaKdlfquhYKJReshs1UsG+16h3O9Mu74Cn8pTm/uxwUbfDp3/:NNGFLL3fqMR1hs1Usu3XsZ8pT7NbfF3/
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\.lz\ = "lz_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\lz_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\lz_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\lz_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\.lz rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\lz_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\lz_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\lz_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2684 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2684 AcroRd32.exe 2684 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2384 3052 cmd.exe 32 PID 3052 wrote to memory of 2384 3052 cmd.exe 32 PID 3052 wrote to memory of 2384 3052 cmd.exe 32 PID 2384 wrote to memory of 2684 2384 rundll32.exe 33 PID 2384 wrote to memory of 2684 2384 rundll32.exe 33 PID 2384 wrote to memory of 2684 2384 rundll32.exe 33 PID 2384 wrote to memory of 2684 2384 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Factura (8).tar.lz"1⤵
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Factura (8).tar.lz2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Factura (8).tar.lz"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2684
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5aaafb938cccbca913df70fdde66c2299
SHA16f4fb6369214eab08accbabaf26545087944a763
SHA25691f3dba38bbe55dc0079c9a8c8d357348d5e535c4482248ea4340217ef382dc0
SHA512248f755b3ec94ff843a1cb4d61883cf008295772884d5a35df127a6804e13dc5e832ddf49fb9bd924658a457d1e09b001e9b394bd2566377ebfe9c1f1de3244c