Analysis
-
max time kernel
1563s -
max time network
1565s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 12:29
Static task
static1
General
-
Target
canvas.png
-
Size
311KB
-
MD5
444b3b03308182dd0aecfa0f65ac7fe8
-
SHA1
6a80aa06997177ba8c9f6f5159bf9bc054a086b8
-
SHA256
eb119a7a6a512d5764a5c9bdb0d45f3af643f458c6801fd689cd77ef37597d7c
-
SHA512
4d85c06f5673edea55cc68d29ee430210f882354c1584da78275fd3cb70535543fd75bd5b6b03a4d78219a6222eea107c0f2d2201dc28154015cf2f672eee223
-
SSDEEP
6144:asr0TcmKp40o0j47j18I9iNKuE9xbJKgNg3HGPGHjx4WJ16hvByHS:an90j47j18C0VytKgm3HGP8x+Bz
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
DllHost.exeAcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings rundll32.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
rundll32.exepid process 1260 rundll32.exe 1260 rundll32.exe 1260 rundll32.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
xpsrchvw.exeAcroRd32.exepid process 2656 xpsrchvw.exe 2656 xpsrchvw.exe 2656 xpsrchvw.exe 2656 xpsrchvw.exe 1676 AcroRd32.exe 1676 AcroRd32.exe 1676 AcroRd32.exe 1676 AcroRd32.exe
Processes
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe "C:\Program Files\Windows Photo Viewer\PhotoViewer.dll", ImageView_Fullscreen C:\Users\Admin\AppData\Local\Temp\canvas.png1⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:1260
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
- System Location Discovery: System Language Discovery
PID:2880
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\DisableRead.js"1⤵PID:472
-
C:\Windows\System32\xpsrchvw.exe"C:\Windows\System32\xpsrchvw.exe" "C:\Users\Admin\Desktop\OutEdit.jtx"1⤵
- Suspicious use of SetWindowsHookEx
PID:2656
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5de2a3a88bc87be7b752095c287d69ebb
SHA1f87e1e09bbfb2d4f1b0099ff067ee52a69ee0d5e
SHA256da74f76a2c66b2c4fb984dc8fcefec1a21e989d17b56fee9f0ddbeddd89140ff
SHA512c54dcac99955dbf0e25a831af3f8e5dc110351328ba3712b3602495f0208c2222ccebc7f6a56972325c652117cb506ebfbb9db4cbaaf66c3dc80b118902a03bb