Analysis

  • max time kernel
    118s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04-11-2024 13:52

General

  • Target

    app-11.17.0/locales/uk.pak

  • Size

    870KB

  • MD5

    83e5f0092b6d72403b60fe0e1e228331

  • SHA1

    989ed480b7ef55dfc9ccfbef1a5b9b0e104693d8

  • SHA256

    29d68d90512ee9952635c7e074d5ab210531d93ae24c11a8f91bca20b685e9a2

  • SHA512

    9895928ee516db7d4395b2788135a814031b9ba45e3a837e633bc253b08d6f380e4078d4d3fd51ae37502a39ff45a0166969fb62365e890f4960a51040b20941

  • SSDEEP

    12288:OnyGlcHZ1U6nnzKT0hsEiwIt35GB3IjZAmXEN7OucLNiXEqqb6Red:OyGlNMi5rEo

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\app-11.17.0\locales\uk.pak
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1052
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\app-11.17.0\locales\uk.pak
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2120
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\app-11.17.0\locales\uk.pak"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    bc97cb5be96cbac7e4e75f9904ed2ba1

    SHA1

    03f952eb409ef8b86588235c96978ae8ca0d312b

    SHA256

    f2ea11f3d69bfbaa08cf867ab0b25ca444a7aeb55ee9638e278674558e189eb5

    SHA512

    ba2b54d8704d6d31958f6dd50ac31d7dc97e6e70a79715a70cb9816b750b7083a8a0b8761da7c52a0ce104be13a378d8abc307001cdcac310d1b8e436fcff69d