Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
13-11-2024 12:44
Behavioral task
behavioral1
Sample
IMAGE LOGGER.rar
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
IMAGE LOGGER.rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
IMAGE LOGGER/Image-Logger.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
IMAGE LOGGER/Image-Logger.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Y�a�2.pyc
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Y�a�2.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
IMAGE LOGGER/loader.cfg
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
IMAGE LOGGER/loader.cfg
Resource
win10v2004-20241007-en
General
-
Target
IMAGE LOGGER/loader.cfg
-
Size
72B
-
MD5
14dd624d81545d1f71419ec7ed0e8ff9
-
SHA1
45c65cf7d21668fbbccf797e3c197398e68f14e1
-
SHA256
8753316bac83333016b97b2c58df1abc90ac733bf532fb8854129a4ec058ad78
-
SHA512
1125fd507a4ae9aeecbc39d11d1705d3c09cd4d8c0f43c242cb158a9921fcc0637b99ec8f83ed70f2e4641a06f539f1e484e7baedd3acc793782e412d5fd7063
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2768 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2768 AcroRd32.exe 2768 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1804 wrote to memory of 1908 1804 cmd.exe 31 PID 1804 wrote to memory of 1908 1804 cmd.exe 31 PID 1804 wrote to memory of 1908 1804 cmd.exe 31 PID 1908 wrote to memory of 2768 1908 rundll32.exe 33 PID 1908 wrote to memory of 2768 1908 rundll32.exe 33 PID 1908 wrote to memory of 2768 1908 rundll32.exe 33 PID 1908 wrote to memory of 2768 1908 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\IMAGE LOGGER\loader.cfg"1⤵
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\IMAGE LOGGER\loader.cfg2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\IMAGE LOGGER\loader.cfg"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2768
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5cc2820fa0a5a081e947c8cf1acb68b78
SHA1397170f8f1534676f5d1c81c05ff3f8111de93d4
SHA256a67533b9909282e1c6aa709487caa9614737bb46b8fc133dabe06b11e5aae5a4
SHA51283980f53cbfe8f27efa9831a6c2768bdb6263756f15360e8d9b196c632594bc1225f854712d426667a39ece6b042a5480dcadc6e21e543ad2bc5c3fd263e3941