Resubmissions
14-10-2024 01:14
241014-blws4ayfmq 814-10-2024 01:08
241014-bhfygavaqf 1014-10-2024 01:05
241014-bfjatavamh 314-10-2024 00:48
241014-a529jstgpe 314-10-2024 00:45
241014-a33gjatglc 3Analysis
-
max time kernel
1565s -
max time network
1566s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-10-2024 00:48
Static task
static1
Behavioral task
behavioral1
Sample
main.go
Resource
win7-20240903-en
General
-
Target
main.go
-
Size
5KB
-
MD5
3cc0d416c4ce3235ce06580ddcddcd22
-
SHA1
6f63166d2fb6855149aa7bf16706ed9c6580b28a
-
SHA256
deee2ea8dbf5abd5e3ed3bf22b9a06a0a1e3b127e24f0c7cf7177bf160e45a7e
-
SHA512
0d1819acf9ad338db114930d99c69506a01388b5c2bed25217307671e45224427458f96b40d940f0fc91e62694e00201ac2f8e6f6d90d0ca6ba92dc81e98fe23
-
SSDEEP
96:C58jbrWRqQk5f5ihdMhMO015lgVY/Wa8pgYWWp/Q:sSDihXDM8WO
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AcroRd32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid Process 2748 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid Process 2748 AcroRd32.exe 2748 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid Process procid_target PID 2380 wrote to memory of 2280 2380 cmd.exe 31 PID 2380 wrote to memory of 2280 2380 cmd.exe 31 PID 2380 wrote to memory of 2280 2380 cmd.exe 31 PID 2280 wrote to memory of 2748 2280 rundll32.exe 32 PID 2280 wrote to memory of 2748 2280 rundll32.exe 32 PID 2280 wrote to memory of 2748 2280 rundll32.exe 32 PID 2280 wrote to memory of 2748 2280 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\main.go1⤵
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\main.go2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\main.go"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2748
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD55eae0f5256fb3845a0218f179ae61222
SHA17c46e9c17084bafdd3f1614436fc5efb12e6899e
SHA2564e88501698ec4de5669584bd3d988d48964c3ce649dff439fcb8073b764e7fe1
SHA51228cf994aebf4db1a545988217e1751ad6ad71ee431c383a2933635b811d4e57cc7a77c8daa37cf0f3e3e0ba4c2929b84e7a7bc81d78785f351db2614cfae2743