Analysis

  • max time kernel
    109s
  • max time network
    24s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2024 00:00

General

  • Target

    Paste 4.4.0 [MacKed]/.fseventsd/000000000159b124.gz

  • Size

    72B

  • MD5

    a38a42a0dcd772a5e3ed5be9631c8ef7

  • SHA1

    c8ed6828fc0f49f746e35201771629d5ea575a02

  • SHA256

    69fdb513d0a71b6abfce7cb0f5231d506ea9aaada135fd8aec971291de500d3e

  • SHA512

    6b5749fcb4f90edd46682aa90a2e6ee0bac111f09f26e580a1706febea6ec5e8e73e9c68a4dc8a7569366e924db879e856cd950fa6566d726df471aac52275ef

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Paste 4.4.0 [MacKed]\.fseventsd\000000000159b124.gz"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Paste 4.4.0 [MacKed]\.fseventsd\000000000159b124.gz
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2680
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Paste 4.4.0 [MacKed]\.fseventsd\000000000159b124.gz
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2672
        • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
          "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Paste 4.4.0 [MacKed]\.fseventsd\000000000159b124.gz"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          PID:1992

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    3bfb209c4ba8975e83be6d85fa2a8a98

    SHA1

    fd831331043211d29b9a0526b30e1fc11a2eee8d

    SHA256

    128e4beb2f8142860f90d079865b7b6f9ec3b91aa1fa79139234eb51657da2da

    SHA512

    8ed23492aae535c78c6889dc15d5e85e71ea32186a400e72a2be68b5bc38969e900c6b6935e287f3e3855f15631e4bd437309f93ca188c06b4a4d98a49d5be2c