Analysis

  • max time kernel
    1562s
  • max time network
    1576s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2024 17:25

General

  • Target

    riptweakcracked/locales/bg.pak

  • Size

    226KB

  • MD5

    470dde3136a8da5752fcde269d4b6b43

  • SHA1

    85196012cc0df090650244f7b55e51728c68806b

  • SHA256

    cd6701f8b682b6d677ae2010abfb4bfd19555bb42847e2ffddc54e203d50b373

  • SHA512

    b39397c8a3a081e61dd52ebbc0a4cc2ac33f9427c1ea9215995cd8915d705f30d2d3290742155890a61fc3819b6076c1ae41d278171517622ad35fc6f430702a

  • SSDEEP

    6144:ZRQoKRDBa4V175RTKa40IzN/frZzrmLy8APWx6y2Hw2ReusUVT:ZCoKRNa4V175RTKn0IzN/fILy8APWx6P

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\riptweakcracked\locales\bg.pak
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1332
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\riptweakcracked\locales\bg.pak
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1488
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\riptweakcracked\locales\bg.pak"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    2299f6553d5f6ca300315aa2891e8283

    SHA1

    6fd07f5493b10395601ea2c2ee33ddcc44f61114

    SHA256

    d0083a104b62c7de2d62104e83b148477744f7635ff302ab8e8b28ce63daafde

    SHA512

    d59571115aa77e385340f33d342a2516ae3631d097cf5e611d1adbd02d51d1fbdd4a7ccd7c7d441b7d4c8bc45cb365973820c61a00290dd29e563cf4048de00d