Analysis
-
max time kernel
103s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 11:53
Static task
static1
Behavioral task
behavioral1
Sample
LICENSE.md
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
LICENSE.md
Resource
win10v2004-20240802-en
General
-
Target
LICENSE.md
-
Size
1KB
-
MD5
99c8d7ebd33559a14514bfcd2721bf1a
-
SHA1
7b219452c58d4b19ad6c68f9f6bec71a92d318f3
-
SHA256
d2ce025996a109a989b0aec67d4e7a76927bd6c144abd004af1b0650be755508
-
SHA512
7544a465c2fa0586442e192223bb1fd0fc86132755a375d91e011ba8c9ff404e633655e1266bfe256bdec4d2e9e99f7bddbdc2a6a3117041d242d6845e627e07
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\md_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\md_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\md_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\md_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\.md rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\.md\ = "md_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\md_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\md_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2748 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2748 AcroRd32.exe 2748 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2068 2216 cmd.exe 31 PID 2216 wrote to memory of 2068 2216 cmd.exe 31 PID 2216 wrote to memory of 2068 2216 cmd.exe 31 PID 2068 wrote to memory of 2748 2068 rundll32.exe 32 PID 2068 wrote to memory of 2748 2068 rundll32.exe 32 PID 2068 wrote to memory of 2748 2068 rundll32.exe 32 PID 2068 wrote to memory of 2748 2068 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\LICENSE.md1⤵
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\LICENSE.md2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\LICENSE.md"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2748
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD59007e50b989d6497b0362acbab06f3b7
SHA1a35d89eee54a0facca2657c2d020beb18a971a5f
SHA256e9e1464ffdffdeea8d8b2868e5c645bff1c708de3f4632aa85995e64c645f950
SHA512bacfb0628e2ba04597684983084ccddb98f4bbd53bfe456980fe9af5bf336b7ff375adb893629dd9de901b54a6b0d26614403a3c58f9c2c95e40414b74c19425