Analysis
-
max time kernel
1562s -
max time network
1567s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 12:43
Static task
static1
Behavioral task
behavioral1
Sample
update.sh
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
update.sh
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
update.sh
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
update.sh
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
update.sh
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
update.sh
Resource
ubuntu2204-amd64-20240611-en
General
-
Target
update.sh
-
Size
3KB
-
MD5
11b5319f12983cb1c99edc750d66724c
-
SHA1
655b3e158548d7bbc89f38330490d97c554b2988
-
SHA256
83494ed11fc33a848fd5c8d6fc92d92b9a5a4c712fc9ecfcdb84cef6271ea0bf
-
SHA512
99ba7efe8bad98adaffb423cc9461499770a448d29aee5d1a2785d808d4a4a09d8b9f4ebe55279c7c3a527a4fc7792197e2785430dd5ec1184175b30ef51d774
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\sh_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\.sh rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\.sh\ = "sh_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\sh_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\sh_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\sh_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\sh_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\sh_auto_file\shell\Read rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2820 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2820 AcroRd32.exe 2820 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2588 2660 cmd.exe 32 PID 2660 wrote to memory of 2588 2660 cmd.exe 32 PID 2660 wrote to memory of 2588 2660 cmd.exe 32 PID 2588 wrote to memory of 2820 2588 rundll32.exe 33 PID 2588 wrote to memory of 2820 2588 rundll32.exe 33 PID 2588 wrote to memory of 2820 2588 rundll32.exe 33 PID 2588 wrote to memory of 2820 2588 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\update.sh1⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\update.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\update.sh"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2820
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5eaeff2049f46dc4adc3f1ba9bd8db51a
SHA1f365f585c2b5ae67a5f7a727f7e5aac6b1980d26
SHA2562d2f603c22877debeb24a337f1f9404aaeaf52e084cc774fea1979a0c54dea02
SHA512d01055279d6da91c5bb2d52edb4b647456bbfe33912a147116b53a1092663e0f03e0e0c70ad582f95777a5398c822a6bc1ea3d7836c3f5f7cd7327bda5f57374