Resubmissions

15/10/2024, 23:54

241015-3x4fvsxemq 8

15/10/2024, 23:51

241015-3v719sxdrl 7

Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/10/2024, 23:51

General

  • Target

    Payload/Mabz.app/Info.plist

  • Size

    2KB

  • MD5

    12819148299da25be7357b07916c54ac

  • SHA1

    c73fd39944749dca61eedbf98d0bde2a33d4f376

  • SHA256

    baca1fce8f8f15b114e10e5ba3e7c9aba784cf6b3a715179298e82ccfa223c86

  • SHA512

    40c22beba1d5c6cd5441bd736f9c6d1d68103ea9cb3d590519a876bffb445f72c45dc40af1d589c3ac549fc3659a9f6a1712cf01fb44db5a5bf6ccbd86deebe2

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Payload\Mabz.app\Info.plist
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2760
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Payload\Mabz.app\Info.plist
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2940
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Payload\Mabz.app\Info.plist"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2600

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    06a9f5f1406a7b763d78c173708cf500

    SHA1

    97118ef80e68a5c2e5686d7549c2cb08da47bf3f

    SHA256

    b980b7e08432cbbfcdca527438e71ad8c0c4a20e0acd87e5843fe29e2dbeb15a

    SHA512

    b1f1765c5f4a2d2f4d1d97c2fc7589540862c324f452bf355db2f039490ee50eb2419c7926fb19ae50afec50f3bbf17439fa23c821b7544ad51c6060d8b7743d