Resubmissions
13/09/2024, 08:50
240913-krrk1avbln 813/09/2024, 08:46
240913-kpfeysvdlb 313/09/2024, 08:34
240913-kgtbvavakd 8Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 08:50
Static task
static1
Behavioral task
behavioral1
Sample
em.rar
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
em.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Launcherkks.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Launcherkks.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Launcherkks.pck
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Launcherkks.pck
Resource
win10v2004-20240802-en
General
-
Target
em.rar
-
Size
17.3MB
-
MD5
b18017525805b6fea9e5115f0b0c71ce
-
SHA1
3f14138c59369a0e66ed16cfdefc06e39bb3f59f
-
SHA256
260f06f0c6c1544afcdd9a380a114489ebdd041b846b68703158e207b7c983d6
-
SHA512
28a8227a769d89ef6984a374e0498e5d771f37ef29bdacfc68da5f449a4c336fbbac16e5174aff06ecf60a0b29cf5ede4c5883f0f248e996b994ad1ecb1f5cc1
-
SSDEEP
393216:1M5fWcqpKnHDBQ7jsW3z6Q1wL19Z6YVuFt6Fw0HPOHl1T590MZBxNyRLOb:qBqQnHDB8pYB/6YVuWa0vscMJNyRLOb
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2732 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2732 2668 cmd.exe 32 PID 2668 wrote to memory of 2732 2668 cmd.exe 32 PID 2668 wrote to memory of 2732 2668 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\em.rar1⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\em.rar2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2732
-