Analysis

  • max time kernel
    125s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    06-09-2024 15:56

General

  • Target

    sample.tar

  • Size

    1.4MB

  • MD5

    6684ddd4e1abd48a38562b27b031897f

  • SHA1

    671b0c4f734415e56666c8e238b6e63645d4d746

  • SHA256

    d4e1522da41954bace3965a4653d5604f57c4679121d1ea1952a6e00cc50d07e

  • SHA512

    57c773bbae868552871a241c21ee9ab81fbd1fe17db4c6efdba03ed68f95f584bc0a47286837dd59a61a1756120edee83f7b1b24550d7202d5491c7255d7aa91

  • SSDEEP

    24576:x/yPbQ/8GreJLDAvcFz7Q0U3VgAA2gUf3THW09jY86VxOsF:xYuUR7wg0gUf3Dtw

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\sample.tar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\sample.tar
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2852
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\sample.tar
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2840
        • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
          "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\sample.tar"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          PID:2368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    a41e901b61d13e302dc63c77574ec32f

    SHA1

    536a62194ee52af2d4cbc707040d62a445a114bd

    SHA256

    fe67328e9a6fe04e6316cacdc8750caf8c870bbe1cc4ae35620726b1717cb700

    SHA512

    d260158a2b874e13de8a0805b1595030172d5c1560a362a716e1dfd0ce1b53238406f1c86bcc27dc50a8d82a91809e3304a03d654f09e4fafa3f50c9ff3d929d