Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 18:04

General

  • Target

    icudtl.dat

  • Size

    9.7MB

  • MD5

    62ce282dfe0ab8f2a35a529faeb61ac2

  • SHA1

    c35d6e4db540518263214697f589c54faac87533

  • SHA256

    c3b6588446b4a48e36dc135f9920ad246f5c84fe59c634b4225b009dd1dace13

  • SHA512

    a773bf66fcb9a12c1d8f3a760724c8438c7f240617b8099e4e2af979b84676892dbcaa866ca2fad59d2e56493ec3f96f0874e4e6e7fe7ca25e22ea2606e9a853

  • SSDEEP

    196608:oEUPty2AZfCHliXUxR0jvzl3Whl/dlTNRq:+12ZGliXUxR0jvzl3Whl/dlZRq

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\icudtl.dat
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2160
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\icudtl.dat
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2192
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\icudtl.dat"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    85d86f5f07113ea3153b5a45be5e6023

    SHA1

    fdc90a4bf2820addf995d86d21f001ecd85534f4

    SHA256

    0bff71238d51ad34b8c2e85804d647596bcb549ce3bd5c056b6756c7b196ddba

    SHA512

    241908ab99e5c5189ddaaf24e019f93ce29b1470076f6aba7794d8566c4c34dbce504e0ee85a555bf67ac3954fd0d30ddebe4fc9fe4b8b873b4a8648a9c71900