Resubmissions

20-09-2024 04:02

240920-els9raxhrn 1

20-09-2024 03:58

240920-ejgsyaxgql 1

20-09-2024 03:52

240920-efgc1axbng 8

20-09-2024 03:48

240920-ec8m3sxejn 8

20-09-2024 03:44

240920-eaks8swhke 8

Analysis

  • max time kernel
    103s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-09-2024 03:44

General

  • Target

    Cert/.bash_logout

  • Size

    220B

  • MD5

    22bfb8c1dd94b5f3813a2b25da67463f

  • SHA1

    dc216ac4a4c232815731979db6e494f315b507dd

  • SHA256

    26882b79471c25f945c970f8233d8ce29d54e9d5eedcd2884f88affa84a18f56

  • SHA512

    c3d739f4934824d81f561c9b626b494e3c256b5a97642667882632db030fc1a8c7d23eb1ae5db7e9f63ae46ee84dbee69d15130dd1482a2c1e8aade1dfc545a2

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Cert\.bash_logout
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2260
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Cert\.bash_logout
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2792
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Cert\.bash_logout"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    818da1af2acb827e9608e03cb7d407d7

    SHA1

    1deec64ede89979b1a2960e56bbbe843a0be763b

    SHA256

    a89967b00dca36be28d1b1ae5420ed405f9b35eab65050f0025cce32e17d4ba9

    SHA512

    e1cf37404ecdf9face82746053bf5c195646e76f78636b6ec186560a53dd7d672cdcf07d761f0c96b52d13f66e4feba54b4d7d217ce92e7a697b55cf89894d8d