Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-12-2024 15:01

General

  • Target

    BasicAvatarGenerator-2.4.0/BasicAvatarGenerator/BasicAvatarGenerator.csproj

  • Size

    667B

  • MD5

    8affc0a074e532d6ed48fedf1ab5118e

  • SHA1

    af046b1fe9975214f55df09be92d5075ffd294c2

  • SHA256

    0a391a1379b0a2ba9d5acc9ba55f29f4b30e83d16d04580ca1e0aa07b5246c89

  • SHA512

    9e9f9e8dfec650ed66db5d68022f4a17573fa65e3af95de796dc11f2b0b32ff062a75cb6c4796c62170c1e1a9679e70270808661ba03d9026e789679704bec0c

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\BasicAvatarGenerator-2.4.0\BasicAvatarGenerator\BasicAvatarGenerator.csproj
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
      "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\BasicAvatarGenerator-2.4.0\BasicAvatarGenerator\BasicAvatarGenerator.csproj"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    fb4196c7bfad38bacd28ccdffa5847f6

    SHA1

    2d6886adab5d00913ca7d8b9c11c0b7c35d33b33

    SHA256

    8eaf9c9945b42288bad3fe2e5af0c0f2d7082d1e84f628ad869d56bd43dffb4c

    SHA512

    373f89b119e047038602287340dc7b34f1b6d36ae946806e51eaac24e63711f9811c22d98eb80cc91bdad57d8b5988d988834830a30113957183295e36cd106d