Resubmissions

15/10/2024, 23:54

241015-3x4fvsxemq 8

15/10/2024, 23:51

241015-3v719sxdrl 7

Analysis

  • max time kernel
    103s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    15/10/2024, 23:54

General

  • Target

    Payload/Mabz.app/embedded.mobileprovision

  • Size

    18KB

  • MD5

    912025cdbe6b676e279ae5a0bf2bb5f0

  • SHA1

    5d99d7fd06bdd1d2c64f0c3be45ff086f8e201b6

  • SHA256

    a9dbc218bdb8783cab7aa6040628d3f93a250cc829e26efdefb31236c7e706bb

  • SHA512

    311d7fd91a4d901adfd2bb0dee70f0dc7d5268e325cf9af1327b95a15f377ca1a18f99b1042e4d7e0e02b57c2fee1ea3dcc08ae079f21fb595e973fd0d3b5b0a

  • SSDEEP

    384:mhMELWBP9qBVDDou9701cihVO8QQ8BLPs0t0I2/mW8h:ODLW9CD8u97eO8QQOPs0tI8h

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Payload\Mabz.app\embedded.mobileprovision
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2548
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Payload\Mabz.app\embedded.mobileprovision
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2288
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Payload\Mabz.app\embedded.mobileprovision"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    1d4c36f38414c7c6f125b16708cd0bc6

    SHA1

    22b7c1c2cad73fb1a92cc125e6f92cccbf22eeab

    SHA256

    b83fbc9010cd3a2279890d9972768b731f1a42f283c177236a97629abe1daa21

    SHA512

    002c303a275b58973e7c49120855cf67ca293825b0c9a1f689829ea85ba096bc2b47dd65e87c0eded6e3d7a24ec6fb16849238cc8cd8b12ac3b39e2d4fb0e0be