Analysis

  • max time kernel
    102s
  • max time network
    21s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2024 15:28

General

  • Target

    locales/th.pak

  • Size

    792KB

  • MD5

    293ad7c20c22d744e4db0fb001ec45bb

  • SHA1

    486c9e0732306a45aceb633da2b3ded281197620

  • SHA256

    d67d68f24d3347e244a7e8c3b63d47f18fcf37258256f48dad785cf98bb560fa

  • SHA512

    ac2b2dd82095925b3229958e89dcf5283bdce0273734a0c338f5a1aa8b014644806ca517f0fc2003669910e58fedf9c2ca7a009fa3f53d58c07bc5e9191f2e2f

  • SSDEEP

    12288:z0O3mMkgs3s5UW4HLRflsjj8sKGs1loIG0EeuLADh7Kle9dPu753ohP09XAyFHyW:Y69K5V5q

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\locales\th.pak
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2116
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\locales\th.pak
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2960
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\locales\th.pak"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    8e47bb9c558fa99d19e66997d941d1d1

    SHA1

    5b393162e1b04c0b237bbf1014c6553b0428a090

    SHA256

    5e262bdc188829748784baead48cf9f0c57ca32efeaef994ed181ba13ff6188d

    SHA512

    c279d814cb9d63b9503bb8a8ff3f6666e05dbe35c3cec5b46ff4beba4848c97e6b0d79101593d5613fcf3f28273cca8ea00fa28c1297dde034c715af0ba93035