Analysis

  • max time kernel
    359s
  • max time network
    365s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-09-2024 17:15

General

  • Target

    resources/app.asar.unpacked/node_modules/sodium-native/libsodium/autogen.sh

  • Size

    759B

  • MD5

    59ad806baf33f71de630e055553513d9

  • SHA1

    2acbf8cc882e23e8539b1af5ad2c0335b1d5ee13

  • SHA256

    7590a052aa09d91f87821714e52d14a742302e0a12d7c11d94119b89e9ba445a

  • SHA512

    729130ab0c6248984068c1505d2811d05e19d529c4b8b087117e385e81f430bd69e78cd71988e59f5a2920416af4b04eae11644228e1de3c2940dea3072b9223

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\resources\app.asar.unpacked\node_modules\sodium-native\libsodium\autogen.sh
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:340
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\resources\app.asar.unpacked\node_modules\sodium-native\libsodium\autogen.sh
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2504
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\resources\app.asar.unpacked\node_modules\sodium-native\libsodium\autogen.sh"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    648130888d9508e490217d8bbc849db2

    SHA1

    8b807f2c3871735a49ba1dccde0e418bca3f1c72

    SHA256

    016ed805d46a59e98028b4764349d904386a813ee8a8b7c9998ac53b787cd589

    SHA512

    4d9715c0e00fa639ee6aa3843dfb08493337c9456a117f5fd6237eca58b0af56cb2678a3a9b2315528e5887b9b922005c0dbaff8fa61533ca3abca31afe36783