Resubmissions
24/04/2023, 11:36
230424-nqscpabe73 519/12/2022, 13:56
221219-q86ddafb63 101/12/2022, 10:10
221201-l7s97scd2t 114/11/2022, 17:31
221114-v3tjvacf75 6Analysis
-
max time kernel
373s -
max time network
438s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
14/11/2022, 17:31
Static task
static1
Behavioral task
behavioral1
Sample
Reptile_World_Launcher.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Reptile_World_Launcher.exe
Resource
win10-20220812-en
Behavioral task
behavioral3
Sample
Reptile_World_Launcher.exe
Resource
win10v2004-20220812-en
General
-
Target
Reptile_World_Launcher.exe
-
Size
729.7MB
-
MD5
104040e6e42d6d0e024129b2f1a20cf2
-
SHA1
f1d31bd67dc827ab176e0fdfa6266ba135a5d03c
-
SHA256
2fdb1a2e1eb24d8be2b452170704aa773be1c9dec569d61a1c678ac746fd6ccc
-
SHA512
e12bb66b801c1a37ed8acaf359baeaad79bc5939e08e0448bd03d669d143a200e860db6f37fd289f2f881b90c55b1f7ea65676011f44675b6ad289b07af9cf6a
-
SSDEEP
98304:onxC2Mt1CDPel44ZmM36vvHU3dSwTOOIlW3AwPUq376ZFAa:0xC2FeBKvs3R8lC+MwF3
Malware Config
Signatures
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4124 set thread context of 4008 4124 Reptile_World_Launcher.exe 66 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe 4008 AddInProcess32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4008 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4124 wrote to memory of 4008 4124 Reptile_World_Launcher.exe 66 PID 4124 wrote to memory of 4008 4124 Reptile_World_Launcher.exe 66 PID 4124 wrote to memory of 4008 4124 Reptile_World_Launcher.exe 66 PID 4124 wrote to memory of 4008 4124 Reptile_World_Launcher.exe 66 PID 4124 wrote to memory of 4008 4124 Reptile_World_Launcher.exe 66 PID 4124 wrote to memory of 4008 4124 Reptile_World_Launcher.exe 66 PID 4124 wrote to memory of 4008 4124 Reptile_World_Launcher.exe 66 PID 4124 wrote to memory of 4008 4124 Reptile_World_Launcher.exe 66 PID 4124 wrote to memory of 4008 4124 Reptile_World_Launcher.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\Reptile_World_Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Reptile_World_Launcher.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AddInProcess32.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4008
-