Analysis
-
max time kernel
103s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 22:03
Behavioral task
behavioral1
Sample
1484-60-0x0000000000220000-0x000000000025E000-memory.dmp
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
1484-60-0x0000000000220000-0x000000000025E000-memory.dmp
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
1484-60-0x0000000000220000-0x000000000025E000-memory.dmp
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral4
Sample
1484-60-0x0000000000220000-0x000000000025E000-memory.dmp
Resource
win11-20241007-en
General
-
Target
1484-60-0x0000000000220000-0x000000000025E000-memory.dmp
-
Size
248KB
-
MD5
86398b387eb5150b510e6e094f1b88a2
-
SHA1
951c68fb13c1fa07cb76b0655051df0ae342c46b
-
SHA256
ad5ff7cd08d8df6f6fbc9d68a6008189d3470dcede1329a32a88d14e618abf0d
-
SHA512
5071edb3a8ac1a5acbc14b12161c6415ecea7071a477fac0819b1a4a10f6ebcc907390aca51fef388aecf7cb517c50b2a6f73f1eaa629c8d0fc3c46a157c34fa
-
SSDEEP
6144:/BizIWRzBlSIiLaliSMrf5ujpmzqah5LiS:/asaxMNujpcqah4S
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3060 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3060 AcroRd32.exe 3060 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2040 2116 cmd.exe 31 PID 2116 wrote to memory of 2040 2116 cmd.exe 31 PID 2116 wrote to memory of 2040 2116 cmd.exe 31 PID 2040 wrote to memory of 3060 2040 rundll32.exe 32 PID 2040 wrote to memory of 3060 2040 rundll32.exe 32 PID 2040 wrote to memory of 3060 2040 rundll32.exe 32 PID 2040 wrote to memory of 3060 2040 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\1484-60-0x0000000000220000-0x000000000025E000-memory.dmp1⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\1484-60-0x0000000000220000-0x000000000025E000-memory.dmp2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\1484-60-0x0000000000220000-0x000000000025E000-memory.dmp"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3060
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD543241891c8b3467442c5671c5c49129d
SHA157e2cf2979d28f3de2c4d894f29b3d396c63a164
SHA2564db9f9cd37737000490ae0eceb810eea65046c8ea6f04ad06bd182ff62658677
SHA512f387927932383077ac7e1582a3b8489813203b8aa4f3248d26d0179009fde2a8987f4ccc67d14097053959875d50788c1f628e34e86cfd0ab4b36f689d126fd9