Analysis

  • max time kernel
    102s
  • max time network
    21s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    20-11-2024 12:32

General

  • Target

    Source/QtGraphicalEffects/ColorOverlay.qml

  • Size

    4KB

  • MD5

    29081688d43dcb8da43d91554946cffb

  • SHA1

    a5400a608ddac4e3d9641db0651b9be71f430b88

  • SHA256

    9df6bee56d7ff66245bd85fa71047a3adeacf2ca05fe1b507cadf0ed3680d9e3

  • SHA512

    432144ee1a5358aa1077296bab11a71547c1748b8c34df1390fccb6682b92d65099e6d522cf3afb658e57c881021284945248fb08f46289f16365ad287f57ed1

  • SSDEEP

    96:7InLp3RReSQGPl725XquDIRAJWJSKp5E5A6RaNzMbt3j:7ILp3RRDQGl25XTDIRsmSKp5E5A6RaNg

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Source\QtGraphicalEffects\ColorOverlay.qml
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Source\QtGraphicalEffects\ColorOverlay.qml
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2836
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Source\QtGraphicalEffects\ColorOverlay.qml"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2436

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    7495b04ed1a09443121224215d509d4b

    SHA1

    15ec576a14fec0f79fa519c6fe1b5db4156272e9

    SHA256

    f5e12c2e5977eebe4960d25c590fb175ca297d1b0baa0297e6c2dc2d50e29b46

    SHA512

    3e3af96f6a79c0cdd96473e67c71365e52ab65cf17cc31cc1f10498c54f3ca0d0cf49d733f5d953aebee4e0ce1b756f671b912816867e481a1e01bbf772a9511