Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 01:15
Static task
static1
Behavioral task
behavioral1
Sample
36ca93237cf21212b28804e12485505c0cd7f66bec26dacab9e43f67ac67d31c.sh
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
36ca93237cf21212b28804e12485505c0cd7f66bec26dacab9e43f67ac67d31c.sh
Resource
win10v2004-20241007-en
General
-
Target
36ca93237cf21212b28804e12485505c0cd7f66bec26dacab9e43f67ac67d31c.sh
-
Size
3KB
-
MD5
5bfa215d14abd8f4395caa9732d33895
-
SHA1
eb135ed32e7264364636c8f800031fc01f095047
-
SHA256
36ca93237cf21212b28804e12485505c0cd7f66bec26dacab9e43f67ac67d31c
-
SHA512
dc2995d6a0ff329e7f7a32179a06711972ca7623fa9f635716e0213d7b3a56c34918ce3bb37782f03813315d2bb8c2eec161563ed2f6b70ac59710efaf9f3a9b
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2564 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2564 AcroRd32.exe 2564 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2604 2780 cmd.exe 32 PID 2780 wrote to memory of 2604 2780 cmd.exe 32 PID 2780 wrote to memory of 2604 2780 cmd.exe 32 PID 2604 wrote to memory of 2564 2604 rundll32.exe 33 PID 2604 wrote to memory of 2564 2604 rundll32.exe 33 PID 2604 wrote to memory of 2564 2604 rundll32.exe 33 PID 2604 wrote to memory of 2564 2604 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\36ca93237cf21212b28804e12485505c0cd7f66bec26dacab9e43f67ac67d31c.sh1⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\36ca93237cf21212b28804e12485505c0cd7f66bec26dacab9e43f67ac67d31c.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\36ca93237cf21212b28804e12485505c0cd7f66bec26dacab9e43f67ac67d31c.sh"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2564
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD52aaf9c6d111f74555afb646d0870d9df
SHA13ce9bfa5714078d7de5a69bab95e3ebe767ddc87
SHA2563a2340837c18fc4f229d16809943b3d91ae0f1eb86debad38760224d201e380b
SHA5123b294591319a72c84dad49ec3fd10b3eeeb58263978aa4795843b2f0b558d8d93feacfeac1155ce8d3c3f2dde607c439ee39b4809b38fc4c8e874def2e610073