Resubmissions

14-10-2024 01:14

241014-blws4ayfmq 8

14-10-2024 01:08

241014-bhfygavaqf 10

14-10-2024 01:05

241014-bfjatavamh 3

14-10-2024 00:48

241014-a529jstgpe 3

14-10-2024 00:45

241014-a33gjatglc 3

Analysis

  • max time kernel
    1565s
  • max time network
    1566s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-10-2024 00:48

General

  • Target

    main.go

  • Size

    5KB

  • MD5

    3cc0d416c4ce3235ce06580ddcddcd22

  • SHA1

    6f63166d2fb6855149aa7bf16706ed9c6580b28a

  • SHA256

    deee2ea8dbf5abd5e3ed3bf22b9a06a0a1e3b127e24f0c7cf7177bf160e45a7e

  • SHA512

    0d1819acf9ad338db114930d99c69506a01388b5c2bed25217307671e45224427458f96b40d940f0fc91e62694e00201ac2f8e6f6d90d0ca6ba92dc81e98fe23

  • SSDEEP

    96:C58jbrWRqQk5f5ihdMhMO015lgVY/Wa8pgYWWp/Q:sSDihXDM8WO

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\main.go
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\main.go
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2280
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\main.go"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    5eae0f5256fb3845a0218f179ae61222

    SHA1

    7c46e9c17084bafdd3f1614436fc5efb12e6899e

    SHA256

    4e88501698ec4de5669584bd3d988d48964c3ce649dff439fcb8073b764e7fe1

    SHA512

    28cf994aebf4db1a545988217e1751ad6ad71ee431c383a2933635b811d4e57cc7a77c8daa37cf0f3e3e0ba4c2929b84e7a7bc81d78785f351db2614cfae2743