Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-12-2024 15:01

General

  • Target

    BasicAvatarGenerator-2.4.0/BasicAvatarGenerator.Tests/BasicAvatarGenerator.Tests.csproj

  • Size

    1007B

  • MD5

    4b933c0f031ac7841669b77e4794d897

  • SHA1

    adb844b3552d3810699779f96835d7805f748658

  • SHA256

    dd1fb9d33fcb51802549b9252c657d7c92930df3a26cb4e85a3d9c6d98a8c416

  • SHA512

    2021db4e0ab2984b54b1cadd058e2b074c456bb68869dc89c6490eaeef3ec08721ac36bcffc77df8e23384a1c6e716fb6d7829b863ec99193f853c9893b0cb15

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\BasicAvatarGenerator-2.4.0\BasicAvatarGenerator.Tests\BasicAvatarGenerator.Tests.csproj
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1868
    • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
      "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\BasicAvatarGenerator-2.4.0\BasicAvatarGenerator.Tests\BasicAvatarGenerator.Tests.csproj"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    8c62cc3b83574b0e57095b427fabf831

    SHA1

    fb90eaa9e8f2b185d6c3e76303227817cea62f15

    SHA256

    37c3c6f0678fb9b589fff3ed22884695e82cee9391db20f8b4118f8fc17527e1

    SHA512

    78e5b2be34f389b4d760cda1639b2b5429e2f63f19a6973a58c0f92855c602360a2cd9dc1ec9a08112ae06863d008ba5c3e1cbf1417bf966fec7ef0ab8c5c083