Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-09-2024 19:39

General

  • Target

    Encounter Counter/EncounterCounter.deps.json

  • Size

    1KB

  • MD5

    690f99f46f6e110b440f6fa7f1992ded

  • SHA1

    6d7a749828db359ae65c5ad83b7674dbd49f28cd

  • SHA256

    5635d62e7abef3ffd63c3901c30ee24e77b989ed97c94ae48da858ee44870e8a

  • SHA512

    e20128d63295109b390d336eaca5e561054f0ace9206906aba4d12907af68e456e8002419bd6fc7c9b16b4f59b63ed2a03c9381c416ec5611019c0fbfeabb256

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Encounter Counter\EncounterCounter.deps.json"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2352
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Encounter Counter\EncounterCounter.deps.json
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2812
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Encounter Counter\EncounterCounter.deps.json"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    c12b2250924406d0c8f3b26ad066fee2

    SHA1

    87607f340ea9ed68997c7bc8a3f1961679d80c7c

    SHA256

    d9e056370ac2266fc8852cc0fc6c5af627e60a1caca0c4a422492a7a3ba8f713

    SHA512

    61d96e5fae790bfc533da648c85548e2958dfbe540ff62abf69da940a0a9ec70e91e518065c69cef6d6b1d3e7bf9f228e3b778ed59a26e3a99ab45824e9e1e59