Resubmissions

13/01/2025, 00:07

250113-aet59aymcl 3

11/01/2025, 23:31

250111-3h1resxjcl 10

11/01/2025, 23:29

250111-3g1p2awrgr 10

Analysis

  • max time kernel
    103s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    11/01/2025, 23:29

General

  • Target

    Drivers.pdb

  • Size

    876KB

  • MD5

    7f1edeef84354410614e847d22eba2d2

  • SHA1

    a464c401d8d026d5b96250391b0401e4958f9b92

  • SHA256

    113ee5b1c32c5eb6c5343d590f8dc85d703ea35204cd6547e3cdd8318e6251ff

  • SHA512

    0c645a4ba792070366ccd71ddbf2c578b64ec6ab0a9ae170287c0b5759c3d6714193b36f410eff016707aae2b393eed6f7fe380a31b83f2ba6858f4a1a88d8f0

  • SSDEEP

    6144:8VOZHD9HY4fTqKc06LyVYJu5fALoUKrFcEPHMfHDhMWeqdFvSs+W20xT3wgNAOCl:80ZrOvaSIjDf00IT

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Drivers.pdb
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:908
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Drivers.pdb
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2816
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Drivers.pdb"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    3b7005df27054a3ddedc4d992462581c

    SHA1

    127400104bde1334a23d47e7ad0a8e3a66b2b240

    SHA256

    8acdab20b82f5d34fa79882139e1a4355b25ebd001900ac249eba0882a7a6d9c

    SHA512

    3c9a41038d75c6b4602f4bc57075a4dc51c0e3020ad8896580c468b944b2ef43c99bea589f51bc88280920f5dd2b775f4dce783a675ce300da9c51ef00424b19