Analysis

  • max time kernel
    121s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-09-2024 14:20

General

  • Target

    locales/ar.pak

  • Size

    135KB

  • MD5

    4c4590ffc76dc0a5d321c5d9a1a5fc57

  • SHA1

    4dffc5a448eeafbfac0e94df0a9b97b851d4a830

  • SHA256

    bd06f1f0b8e3f389b084c9f542f9a743ff6b7470dec398cd3ba6c5393e4b80c2

  • SHA512

    0b0d633191172a91abc205407a9abcf00fefcad30be6af600fe661dcea3cc7c914b94d0a5e140ae38665b5b565b96887fd0648b21f846a340761304c4ea202a3

  • SSDEEP

    3072:hDKwOV8SNgnvZhpwyjGxT4WMRxHSM2uZtE9VbZZJLYx7Zad0d4q2jAwG:huz7NgFyZWdX

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\locales\ar.pak
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\locales\ar.pak
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2516
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\locales\ar.pak"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    d484e9046d3f1c2044298920c709897e

    SHA1

    84c63c5dd3637e4b3353e822e93c85718ad081bc

    SHA256

    67ec8ca746a6b8203a5f5cf26475bd00ad1189977124e4b3a1acedf0a105cbcd

    SHA512

    8fcd33956656e8a1ce829982d0f1707e8458f7be84f5d16bf1267525f8eeda74afee07a8d776f3de1cce6d87182a1711288ec02e2c881874a6aaa1c7665f7af2