Analysis
-
max time kernel
4s -
max time network
2s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 20:10
Behavioral task
behavioral1
Sample
Tempures Mobile.rar
Resource
win7-20240903-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
Tempures Mobile.rar
Resource
win10v2004-20240802-en
3 signatures
150 seconds
General
-
Target
Tempures Mobile.rar
-
Size
35.2MB
-
MD5
0a105aba60496c233262ed6647a9f713
-
SHA1
5766e4df6d1fb06eaeb4f8f51738151d3c34a337
-
SHA256
634370f86b4c48a9fcdc35a267eca3731141382abf2bc67705e5cf273ab28093
-
SHA512
dd4f77b034a9b6f4dd72db18c9cf2792b8002ddeeaab4caeb19ee3744d3dc7a5abdcc13fa35f11f2b88e4d453c3e3267795be48622b0bf7983f3b52b43c1cc54
-
SSDEEP
786432:mPMk84931AewWkPF93ePERmHv1WvUPpVSvqNsAabbe4s:mPN3Fmr7ePEUiJqNsAabC4s
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2320 2156 cmd.exe 31 PID 2156 wrote to memory of 2320 2156 cmd.exe 31 PID 2156 wrote to memory of 2320 2156 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Tempures Mobile.rar"1⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Tempures Mobile.rar2⤵
- Modifies registry class
PID:2320
-