Resubmissions
04-12-2024 02:13
241204-cnr4cs1rfp 303-12-2024 07:31
241203-jcrrsavraz 103-12-2024 07:26
241203-h9ps1svqas 1003-12-2024 07:18
241203-h4xxfa1kdn 8Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-12-2024 02:13
Static task
static1
Behavioral task
behavioral1
Sample
1.0
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1.0
Resource
win10v2004-20241007-en
General
-
Target
1.0
-
Size
176KB
-
MD5
0b8524e411ba80cd84ae3d0fc8fec89c
-
SHA1
88da4f6a5af44bd51006e36381aeb60fc88d148e
-
SHA256
19c7357637bab25785205359b35b87543cc976498deacd7ac0c2e7fec58307c3
-
SHA512
65321c9d854f741a040bff3b335dd846c06439b28c6cddd6eccf1a09a4e76ffc54bb935680490741f44c56a49d12775adaef0270499a3c744c00fffe6c37fcf7
-
SSDEEP
3072:foWGzmseSVatcG72AQgXD6OOGetUzzWMnUjFokAYgj1GLBKCZIskgj1GLBKNW4pq:USsw4pOL/saqkPV9FemLtcsDSsmw49j8
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AcroRd32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid Process 3068 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid Process 3068 AcroRd32.exe 3068 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid Process procid_target PID 2156 wrote to memory of 2700 2156 cmd.exe 31 PID 2156 wrote to memory of 2700 2156 cmd.exe 31 PID 2156 wrote to memory of 2700 2156 cmd.exe 31 PID 2700 wrote to memory of 3068 2700 rundll32.exe 32 PID 2700 wrote to memory of 3068 2700 rundll32.exe 32 PID 2700 wrote to memory of 3068 2700 rundll32.exe 32 PID 2700 wrote to memory of 3068 2700 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\1.01⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\1.02⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\1.0"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3068
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD530e7fb046d41cfc44d439b727c168df0
SHA15d8ddd5f3754b222c652dd3bb54299b62b1db8f5
SHA25668f293157434ab16d8a19dbdf38e9f0facd911e91f26f9deee5d4797a711e04f
SHA512cffce10413c4d9e20bf64a3211864b85708d9b7bfc90fffb766d79deba1e8aa157fd9c3ebb290629bf7f8546fa70be1d7a037c0f5d5c00940a1232b9e7d24f67