Resubmissions
17-09-2024 18:15
240917-wwdeqaxclh 317-09-2024 18:12
240917-wtgpcsxbmh 317-09-2024 18:09
240917-wrmslaxbkl 817-09-2024 18:08
240917-wqx7yaxajf 316-09-2024 14:30
240916-rt67sssfjm 10Analysis
-
max time kernel
361s -
max time network
364s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-09-2024 18:08
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00481.7z
Resource
win7-20240903-en
General
-
Target
RNSM00481.7z
-
Size
91.0MB
-
MD5
b5fd3ccf036ee81814eee3b9f0e54643
-
SHA1
7aae850b68fe3234ec0e835113db033f57ab779d
-
SHA256
d73798bca8ae78c37444470da1322fe301418fb534417877d988751bf1da5e18
-
SHA512
f900ad590f822410eb30c9a43b886eae95aa0af44dba2a5bf8779471df410ae4ddf19328c17a5a3578a1fde272771231c9b5ea53218d44e925936d3be264ee90
-
SSDEEP
1572864:MN+sx1CnlGBt7cSjEZn+G6Yawe/IO1ZT5K605B5W79ldy2IkuNcyaG9fA:Mwsx1ulyBCnYYaw8/T5wBQ/uNfaIA
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2656 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2656 AcroRd32.exe 2656 AcroRd32.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2884 wrote to memory of 1956 2884 cmd.exe 32 PID 2884 wrote to memory of 1956 2884 cmd.exe 32 PID 2884 wrote to memory of 1956 2884 cmd.exe 32 PID 1956 wrote to memory of 2760 1956 rundll32.exe 33 PID 1956 wrote to memory of 2760 1956 rundll32.exe 33 PID 1956 wrote to memory of 2760 1956 rundll32.exe 33 PID 2760 wrote to memory of 2656 2760 rundll32.exe 35 PID 2760 wrote to memory of 2656 2760 rundll32.exe 35 PID 2760 wrote to memory of 2656 2760 rundll32.exe 35 PID 2760 wrote to memory of 2656 2760 rundll32.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\RNSM00481.7z1⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\RNSM00481.7z2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\RNSM00481.7z3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00481.7z"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2656
-
-
-