Resubmissions

07/03/2025, 03:43

250307-ead1pas1d1 10

Analysis

  • max time kernel
    102s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    07/03/2025, 03:43

General

  • Target

    6a7718c005eed33ce409b03914a5b782.bin

  • Size

    20.4MB

  • MD5

    943e1d89214f1bacbb44013b0868074c

  • SHA1

    0e97341c28725979410c0ffd9cde9119688d18cb

  • SHA256

    9c5be8ef39305a0f8157ef34d38bd4d8e166930d4f698aab93104048700deb07

  • SHA512

    c406989fc578d5d8c5212b7f17651371294a881283b1b2c2735e21bee24c921429c728978b0742597a7367d8ee97738f012ead663646a043cab7c2bea719a6ac

  • SSDEEP

    393216:UWrmKiWpcSHbUkRVjW/6zdY4KITmDiBRsKR8trA3/m+Xn1Ul5s0v:/SKi4oHiRGAmD08pg/my1Ul5sa

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\6a7718c005eed33ce409b03914a5b782.bin
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2528
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\6a7718c005eed33ce409b03914a5b782.bin
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2824
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\6a7718c005eed33ce409b03914a5b782.bin"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    874b0d0bec2ebbcdd956cf972b1ec0ea

    SHA1

    80f5f094dd53fa14c264fed303f93d404136a20b

    SHA256

    568fb1256890e829a4bd3e295d153e2768bc44c03bbb0e93b1a756858e50d935

    SHA512

    8b99187e8346424e18af7da06d5197d9f39d892d00c2fb0cdf72c1d9e0ba8e7eb6a9115dca15ec3c79e2f42af4cc211afd4fd53bcbdd794001a5ac7d45f8bff5