Analysis

  • max time kernel
    103s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    06-01-2025 08:59

General

  • Target

    Resources/Data/x64/x86/gh13991.phpt

  • Size

    395B

  • MD5

    a94a76b71c726c0d3e3fcd114f87b27e

  • SHA1

    8c7407bb9991dbc57ee6a4f11e772e6a853dd5f9

  • SHA256

    267f8be6fb2fac6be1175de4510b4a86b10ebac05ef2efba0a49d40fd03a1d3d

  • SHA512

    0d06791c3dec37203134be131e4af6bb3d117851a4423ecc604ff9c7e3bee62bff46680d74e00add90c634b0fd4753ef0ec948abd0d15432e0e88ddb950e1050

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Resources\Data\x64\x86\gh13991.phpt
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:324
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Resources\Data\x64\x86\gh13991.phpt
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2916
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Resources\Data\x64\x86\gh13991.phpt"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    a75d3a204f46f4a2afe2a8423869414b

    SHA1

    7e1a9f35c890e72cfd4853df59e9fd412dceb4b8

    SHA256

    1fac6c5ce370029549859bef030955711452b6cf946a034cbe7c73419893fecc

    SHA512

    1a900b00c6f3a06211f7f76c9dda385f9f9e4e5f3006206b2ee6acf2207b81c326e259241a27bee3259cb494e51019308060215e63d8db3b2b8db40f00bfd595