Resubmissions

12-06-2024 08:39

240612-kkjltawejn 10

13-04-2024 00:14

240413-ajfhnagf98 10

Analysis

  • max time kernel
    135s
  • max time network
    88s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13-04-2024 00:14

General

  • Target

    Malware-Feed-master/2020.08.26_CISA-North_Korean_RAT_ECCENTRICBANDWAGON/README.md

  • Size

    57B

  • MD5

    0d103d48c25db669e6c2a60c6d00f755

  • SHA1

    59b102919b1f1e2170cbe1e01133f5bb3eb85e75

  • SHA256

    02f4920a8920ce63f81794307420430419349050d34b304c5168cbba41138ae6

  • SHA512

    7eb68c452c152de06f117eac85bbb18e675867eae515559628de285ca1bb646bd9a7c2b9306ab2bda42792a3364a72fb2ceed3b6bcc13cc386f16e15edd2e191

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Malware-Feed-master\2020.08.26_CISA-North_Korean_RAT_ECCENTRICBANDWAGON\README.md
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2692
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Malware-Feed-master\2020.08.26_CISA-North_Korean_RAT_ECCENTRICBANDWAGON\README.md
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3016
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Malware-Feed-master\2020.08.26_CISA-North_Korean_RAT_ECCENTRICBANDWAGON\README.md"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:296

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents
    Filesize

    3KB

    MD5

    27b4ba26075777ce9e6bfd7b8f97fe8f

    SHA1

    e4b207deb961cbf95a39844f8270963f3e5ed484

    SHA256

    f519465f4cfe1cb88512b1587d9125675e5dc1c068401382bd7da1b38efb328e

    SHA512

    fb58d11bbf095f8962e8b0f86b0a46f9e4b3fae30ce2bee3853615e29c2bd4a84ba2ddf73bf47e405075ce5584bdb5a91273200f3d8506284695cf6ac392f5d2