Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 07:28
Static task
static1
Behavioral task
behavioral1
Sample
a541014614bf6ea3c0cd06d6b0e8a9f4893f62911300871c7b700a1cfeb8b7dc.sh
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a541014614bf6ea3c0cd06d6b0e8a9f4893f62911300871c7b700a1cfeb8b7dc.sh
Resource
win10v2004-20241007-en
General
-
Target
a541014614bf6ea3c0cd06d6b0e8a9f4893f62911300871c7b700a1cfeb8b7dc.sh
-
Size
793B
-
MD5
79bfe3014ff9e89a1f69d63ac6e50bf8
-
SHA1
c82ceeac261f352e62b36401c9eac99600edfdf8
-
SHA256
a541014614bf6ea3c0cd06d6b0e8a9f4893f62911300871c7b700a1cfeb8b7dc
-
SHA512
e6b53fa674793d10aa4d45bf4bc0a51af31b5a5997ded018eee62aff01aae66743631807269f83a7c11d7b6014439f56e8ec8f26679581711dff324be9b19ad0
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2800 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2800 AcroRd32.exe 2800 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2532 wrote to memory of 2544 2532 cmd.exe rundll32.exe PID 2532 wrote to memory of 2544 2532 cmd.exe rundll32.exe PID 2532 wrote to memory of 2544 2532 cmd.exe rundll32.exe PID 2544 wrote to memory of 2800 2544 rundll32.exe AcroRd32.exe PID 2544 wrote to memory of 2800 2544 rundll32.exe AcroRd32.exe PID 2544 wrote to memory of 2800 2544 rundll32.exe AcroRd32.exe PID 2544 wrote to memory of 2800 2544 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\a541014614bf6ea3c0cd06d6b0e8a9f4893f62911300871c7b700a1cfeb8b7dc.sh1⤵
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\a541014614bf6ea3c0cd06d6b0e8a9f4893f62911300871c7b700a1cfeb8b7dc.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\a541014614bf6ea3c0cd06d6b0e8a9f4893f62911300871c7b700a1cfeb8b7dc.sh"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2800
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5923d25e48fe19f3d2389bfcc9ceb43b8
SHA134d1d232d1b676be05262d6ffd24c0af9c10fb75
SHA256264066404326244bf6c1b21da99d7f2e436bfbac3f6dc1c2f6f2608e00c8a6f9
SHA512f988059350e6ef3b55055aeaa17db1ad142cfd2d785f244dc001d18e8b94335372e1e94c8ffeb9abd21a8f4d6efc3ec26ae70c89ede9728a29c763e23522bb72