Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18-09-2024 09:09

General

  • Target

    Forskelsstempledes/primaterne.bal

  • Size

    210KB

  • MD5

    4dfbb2735095e469334f2bb752c97b92

  • SHA1

    2aa2b420850beb79d50473f48bbc73c529d116ed

  • SHA256

    c390ab2776a0e32c28be6343032abafa8ebded9be4fb718c4dbf10cc6c490322

  • SHA512

    7c56514a242ec54fb5adb96d4085601426b38b9131e63ab866e21e9e9df16bca855ae317a17fc8df064854f47fd2e8d343c25f9c3adf3923844a96b4d957eaca

  • SSDEEP

    768:jVwgfuB4aFRsNFBhpNBReXfqXR6B4ScaMrFXE1vMrLt+NCXrdM+R33TG2zEfGKg2:j9/LZxXIiYD0xC

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Forskelsstempledes\primaterne.bal
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Forskelsstempledes\primaterne.bal
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2556
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Forskelsstempledes\primaterne.bal"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    08e6a98b7acbffb4a248cb5d52968d2b

    SHA1

    a75d504b3bc4dc0e2189d0f644d6e0f544bb5d62

    SHA256

    5000430a3f69bf531e08cde224cff39ee6f56647ae2892138586f834ca2db597

    SHA512

    6f922b8d9831c29c7943a14d761a1e659d20623800a9d6f0e3606af13d107fb4d63c4dde7ae2bb6077fe431d068c7e00c7d26ab15c81cfe5a2cc0ae3a98db8cf