Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 17:44
Behavioral task
behavioral1
Sample
kdump64.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
kdump64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
wps.dat
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
wps.dat
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
wps.exe
Resource
win7-20240903-en
General
-
Target
wps.dat
-
Size
152KB
-
MD5
a1ed676cf36394b6b4fb449309b91b5b
-
SHA1
4cf7a01b132e4855581e39f5d0da204301fdae98
-
SHA256
8da2085b60e44aa5fa46c8613757e1582df098e27373b2c8916d2725f28b46de
-
SHA512
ce224d2376a7d78777691f9eceb8a48755787b390b73e309d48337b8d097a9370e66780237e2884294c76205f93f27e82744804781abe8eaee255c9e2f0f3f11
-
SSDEEP
3072:QJcpYbyI0brQQUiT6J6zInBqF5Pr6veTotEELhhezCATlX:QJFy1b8f+InQ5D6WTkEELhAuATl
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2804 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2804 AcroRd32.exe 2804 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2776 wrote to memory of 2724 2776 cmd.exe 31 PID 2776 wrote to memory of 2724 2776 cmd.exe 31 PID 2776 wrote to memory of 2724 2776 cmd.exe 31 PID 2724 wrote to memory of 2804 2724 rundll32.exe 32 PID 2724 wrote to memory of 2804 2724 rundll32.exe 32 PID 2724 wrote to memory of 2804 2724 rundll32.exe 32 PID 2724 wrote to memory of 2804 2724 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\wps.dat1⤵
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\wps.dat2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\wps.dat"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2804
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5dd14e304722d60ea12effe83420da199
SHA1e67e11fb9f0e0bb6a7ad87e59173d33ac543fdb1
SHA256a033011cfe85dcfcfe53c2181be47baf6f2a51be42d3ebea72772908fea51864
SHA512315e2482c615b8bf78364bb82b1e0fbc861df5d1fb3e1effe5e43befe309d390d05d05b963e3312dabfa77fa8ece4fc2522ee263f90b3431ce0b1930302bd4f8