Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/02/2025, 13:37

General

  • Target

    Ekspositionsdelen.afd

  • Size

    115KB

  • MD5

    22fb834736ef02494e99f71ba7222f69

  • SHA1

    ad6a98d680a72a823b5b175a45f46a8b96b7b7ca

  • SHA256

    7bf5c0010b6e023c90e5896266b53b84b06e8819ca3e17c78024f2a820164c13

  • SHA512

    76de9f0a84157ac194833dc451f000bbe483274cae995a71474bdf636e20ae19eeb6d12081d122b7f7c7cd6bc3e225ef3642f944268a764fe0f6dbd6302a88b0

  • SSDEEP

    3072:PfBZ+bT8joyfvU9lEERRZu+WYY4iUot91:PZI/yZ2l5n4PJHUe91

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Ekspositionsdelen.afd
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Ekspositionsdelen.afd
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2276
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Ekspositionsdelen.afd"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    60f58a4c4b88dd41003450b83a7be11a

    SHA1

    34b4a3853844eca4730a2366142027254b8dc474

    SHA256

    86faafc65da37d80e05ca3e1ce2ea02cc61d71af7a830b8c35da27171f432b46

    SHA512

    628d7a6e67003e1fbdc470d1cad56cd5e4524978d1a91ebf791abcb94223d579da8280ec61f30acb606455ac7b3c4c4fbe76a63d812b8333f43110ba0956c2cb