Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-12-2024 15:14

General

  • Target

    interic.vcxproj

  • Size

    10KB

  • MD5

    f8b01c9d6b2e4b4422c3ec4260561699

  • SHA1

    4efa33fcdbb1bb41544eb934b80cc24bf7ce2c7d

  • SHA256

    a78094048750e7d6f11788e84d9198ad8337179375655fd9c63f8314fa0b641c

  • SHA512

    9eff45b624d1c614928948f05e20493e985c57a32a62d3fac7b5e428a0f0c782520aae2bb8f829a79bbe3087ecea91db667d875cf80f1e87e0e8f0b125792f94

  • SSDEEP

    192:L/zcLts4fbVPR0/gPcV/gPce/xPcF8xPcXb6tYKVB:r4c/kw/kD/l+8lM6tYKVB

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\interic.vcxproj
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2496
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\interic.vcxproj
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1624
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\interic.vcxproj"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    05ec938ab2e55fd789575b7d1bd234a1

    SHA1

    0d621fc95732fecc17e985743150cb173b1b63cb

    SHA256

    54d20136791a10d24c1ce47e548b9fdeaad010b16c472dd6cccb490bfeff6d9a

    SHA512

    5a119e40ef548d9491a12fce7bab70d0526f331334bd1bd9ffd32548f816f5f8a1dbb3955690a87daa365986c1751941cc290039f994a16e972a2b9a3d52c178