Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2024, 01:37

General

  • Target

    5800208678d4341edcd46f99f4e769dbd61260bccc25e0eea46aae377bab6f63.sh

  • Size

    5KB

  • MD5

    0cbd1cb194f286c24d3ccbbd2800d575

  • SHA1

    0fc1d89a3df20fb7e2a9fd02c68f7e0b5c3cf4ee

  • SHA256

    5800208678d4341edcd46f99f4e769dbd61260bccc25e0eea46aae377bab6f63

  • SHA512

    a914e0da36889d8bc32fa795240022e4284dd18508033c774dd7508e2067d04c3d033c15bf26acb1e9e54bc5514bec6ca8d5bca622133af91b38429acaae5882

  • SSDEEP

    96:Qu6dbUoJDWF5cfNd1gdH6xFgzhjuW2VS6n:s3Pd1gdH6xizhjz2VS6

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\5800208678d4341edcd46f99f4e769dbd61260bccc25e0eea46aae377bab6f63.sh
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1576
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\5800208678d4341edcd46f99f4e769dbd61260bccc25e0eea46aae377bab6f63.sh
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2220
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\5800208678d4341edcd46f99f4e769dbd61260bccc25e0eea46aae377bab6f63.sh"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    dfbfa83f7b426e560a22e49916ab3df4

    SHA1

    f6c269fb88f6ec016903ca7bb0b5476e9b059478

    SHA256

    cfb650645fb2771400266bdf1d272938b87cf15e521a338b532a1ec1e3749004

    SHA512

    0eff4b99efc5ca594b69da10c2a5f4b020df34c9ae4b2bab960c23537c1f4b272fa7f5f78917919a977061355af169b17ebdfea898e3f94ffa6d720a8657c58f