Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:17
Static task
static1
Behavioral task
behavioral1
Sample
lol.sh
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
lol.sh
Resource
win10v2004-20241007-en
General
-
Target
lol.sh
-
Size
858B
-
MD5
624a639eef2db3c4f50cb07d825853bd
-
SHA1
576fb57cf2370eaeb31782c757bfd36b17142756
-
SHA256
6966a4d4849c7ad38f564e05dbdabed83bc23fe61f726fc1ce017159e3f932d5
-
SHA512
c8912a4e386339d35e142010d0daed2f1fade2c8136327a44d7eaced1b1fcd43e0bc17e5569d0c595a8c7ce3a45226e240ad0cc69a513eb3106d29967ec7f0de
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2620 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2620 AcroRd32.exe 2620 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1448 wrote to memory of 840 1448 cmd.exe 31 PID 1448 wrote to memory of 840 1448 cmd.exe 31 PID 1448 wrote to memory of 840 1448 cmd.exe 31 PID 840 wrote to memory of 2620 840 rundll32.exe 32 PID 840 wrote to memory of 2620 840 rundll32.exe 32 PID 840 wrote to memory of 2620 840 rundll32.exe 32 PID 840 wrote to memory of 2620 840 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\lol.sh1⤵
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\lol.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\lol.sh"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2620
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f28401f1e3425ce8190d46ba3600be78
SHA1942b1043b65fd720ed15803ad79c5f2cd9707201
SHA25638c1319017982bf98ac77cc0b9e5742734bfeed0e8d80e3c7ce5ce635bc89a59
SHA512a547e716733efe54d9f17c0f27acb68195f79542a973494df9073096704b4079965a99aaf96df773782d152d649fe740c3d7c69724f74a1305a13afb0c617876