Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    27-06-2024 13:35

General

  • Target

    Besttelsestropper.hov

  • Size

    272KB

  • MD5

    f8863d882553a6efb3cb6111e7b13e3b

  • SHA1

    c1079473474483560740fd299e53e9d4f7394b2e

  • SHA256

    7e7cd7ae34b03ce558793e91faeba688e1d6bfd8753faff3d60f0bfdcafb4e75

  • SHA512

    8d4951d30e3774e638cb93d24ad40b0fb738f08939cf30f1d60626277c90f5318f9fa2c5b322be12dbfbb8e7cb869d03d01138a112ebb1c041d3e533a10e1b32

  • SSDEEP

    6144:EBIUbXTygOPJfDSn/ixkc0Ll9yCnYV8bws3fy4B:XkXOZxbakkc0Ll9QsY4B

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Besttelsestropper.hov
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Besttelsestropper.hov
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2888
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Besttelsestropper.hov"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:3008

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents
    Filesize

    3KB

    MD5

    c441e96f67574a8da5877a2008cb28f3

    SHA1

    ebc61bb724d229e498c84d3369c34e0e8e3ba6e0

    SHA256

    6d37f57365929b3523498b8f9c51fbf23738769c3c43d8058920c647926b0d0d

    SHA512

    8bdac559ec0768ba1821de0ab313c972c571695fa44d7bef9e77520a4b4a17498d1196ae5f99b9899ae4e1803a44279462e31d1fd1e15e52914f67778273e1ca