Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2024 21:10

General

  • Target

    dumps/acpower.78N1BA9-1.trc.old

  • Size

    15KB

  • MD5

    09dfefc94677f65a168582f5ae89e76a

  • SHA1

    9365afa3dcf1d560d10484a18a2eea53c1a0fa23

  • SHA256

    7711ff973bd9ec7374e8d474117cc730f6e63e47a81fcb070e8a604b5c6a658b

  • SHA512

    aba907d896bb8c7ef9a1ed139f67fcb4fd14d8076da8cbd4419b4fc03b2f52c1d29cfa82e5dc0cca383ab9f8c698484b94bd73335e13a43ccd44b5677beeaeb7

  • SSDEEP

    384:vEkbi+OzXu97mP+rAmQHyHBBBBOOOOd4EK:vEkbi+OzXu97mP+rAmQHyHBBBBOOOOdu

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\dumps\acpower.78N1BA9-1.trc.old
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2528
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\dumps\acpower.78N1BA9-1.trc.old
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\dumps\acpower.78N1BA9-1.trc.old"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    52b982f3e54da1e572af22d44d83be9d

    SHA1

    24f54bc3337afef74c5473c976de74c525b6760a

    SHA256

    e8e411264b27d679ab0568ef25f423dd9c46431b857ab330d4bb3ab534e19485

    SHA512

    9dc9960c590f53312e2c03a5abdce0f5f8f6525ee3442516c1e43c74678fa28fda3a4ba3dc0cb76ee1ee73c162c19017e0850cb7e8bb6b9f6a5c110b776da70a