Resubmissions

16-12-2024 09:53

241216-lw48bsvpfy 10

16-12-2024 09:15

241216-k739qsvmgp 10

Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-12-2024 09:15

General

  • Target

    .reloc

  • Size

    4KB

  • MD5

    7531f98f48bae981154531be7b0e3ec6

  • SHA1

    154defc8109ba0ee2834f575c61ca810c198bf2d

  • SHA256

    5451208cf24050fe1627207138157fd21e4cd3adea6ce5e865e9b03324b6c6c2

  • SHA512

    a8d9ec0b2d4e1311af7ec0409415053cbd9f912b4e6cec2337db08a4607f82aa3f713481484ce7d02c4d68b6354b7a87b5265f70a3071bf5be56e1b409910555

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\.reloc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\.reloc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2072
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\.reloc"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2076

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    dd2e7fea6fbd83ee317b4c5572fa98c7

    SHA1

    aa7054562b8f2ae5ca6be27f895eeabccc92d649

    SHA256

    7c1fda530539089082efe4b02f77fc03eebacc27e92c6df67ec6489275bd14b1

    SHA512

    4b4fda3b0aab4a3afc5b3ab8e20c1cf482e72e800bde273935b1fa70ab0149a715dad207f7114334961ce14b1124d6d50941715e3e7682b9d0c20093218ed33e