Resubmissions

14-09-2024 02:42

240914-c7fvfasglp 8

14-09-2024 02:37

240914-c4gmkaseqn 7

Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-09-2024 02:37

General

  • Target

    sqlite-autoconf-3410100/ltmain.sh

  • Size

    319KB

  • MD5

    494ed41316779107d9303766fdf58f71

  • SHA1

    7cb19264e70ff41fb066214c9b4d45a6c32621d8

  • SHA256

    0f01592875edd61a11373d84a298cd6f5c1a8006db66fe5c864225b9e91a4dcf

  • SHA512

    c2e2b154fbc02ad7e4531c0d5b6ae8362599bce77c07a7ca9371b2d6e547c538d5db7916cc7553db34e9506e99c620e15769d61647de789c20af618e15a8b220

  • SSDEEP

    6144:DMiSRge9MWrCom5FzLQmoMuMBhmQpteZyUjJjasyp/pCZl+JRKT2MBFpfJYTt/WC:IBnj+hC+

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\sqlite-autoconf-3410100\ltmain.sh
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2100
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\sqlite-autoconf-3410100\ltmain.sh
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2696
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\sqlite-autoconf-3410100\ltmain.sh"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:3000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    8c245dba97429716e4dd5fbd40fd527e

    SHA1

    30f66af57824d63bc6013e0935e523de01f67bab

    SHA256

    78d27fe2e33253d81db0dc885cc3946ad7c0dc50d8d69f15d5a8f093b9e43787

    SHA512

    4310c8abe16a368edf631f5f49fc0ad2f166ce9670db0a1e2bb0d26ab16191599392c34f7794037b26aa6b1238fcdf3f5997c89a849776e58ae78cecd18a4dc5