Resubmissions
01-02-2025 16:22
250201-tt9n2askfq 1001-02-2025 16:20
250201-ts4fmaskdj 1001-02-2025 16:08
250201-tk7s3s1qfj 10Analysis
-
max time kernel
18s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-02-2025 16:08
Behavioral task
behavioral1
Sample
config.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
config.zip
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
config.json
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
config.json
Resource
win10v2004-20250129-en
Behavioral task
behavioral5
Sample
xmrig.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
xmrig.exe
Resource
win10v2004-20250129-en
General
-
Target
config.json
-
Size
3KB
-
MD5
de26ff53e07da716041d372adc241376
-
SHA1
93b1cd0d7d2209d1799fb0af1c8cf96c360a62a2
-
SHA256
b64ac98f7ec85389f1771d488de2c5c1e4c99059c04b02f92fb29b22cf5be367
-
SHA512
c6ffb2fea0133d765c38b5df05a7814e67a348337dcfa1a43f97038186f2b611b9f602692e9c9d98f4a42917c6731233be2e6d86a9bd1b43cd98a086160ed981
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_Classes\Local Settings rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2760 AcroRd32.exe 2760 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2616 wrote to memory of 1988 2616 cmd.exe 32 PID 2616 wrote to memory of 1988 2616 cmd.exe 32 PID 2616 wrote to memory of 1988 2616 cmd.exe 32 PID 1988 wrote to memory of 2760 1988 rundll32.exe 33 PID 1988 wrote to memory of 2760 1988 rundll32.exe 33 PID 1988 wrote to memory of 2760 1988 rundll32.exe 33 PID 1988 wrote to memory of 2760 1988 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\config.json1⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\config.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\config.json"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2760
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD52276268689d9b99df9be726c625645eb
SHA1e8b8a73644d1b7297c903cbfd5a2fc056c5ca9d7
SHA25660c6c4244f7d8f5b6d8bace27a8f71963827ded4fde54d55fd035e78bcaaa6b3
SHA512ce5b80ad2be8e6275243ecf3b86443a00f83962934bbbcd5a09638eda4b6804a11cc423f4f0d61dfb92c4d1274e0a70901c1872717d631fc892daa798866c531