Overview
overview
3Static
static
3CFGUSBLoad...ti.rar
windows7-x64
3CFGUSBLoad...ti.rar
windows10-2004-x64
3apps/usblo...ot.dol
windows7-x64
3apps/usblo...ot.dol
windows10-2004-x64
3apps/usblo...on.png
windows7-x64
3apps/usblo...on.png
windows10-2004-x64
3apps/usblo...ta.xml
windows7-x64
1apps/usblo...ta.xml
windows10-2004-x64
1apps/usblo...ig.txt
windows7-x64
1apps/usblo...ig.txt
windows10-2004-x64
1usb-loader...or.exe
windows7-x64
1usb-loader...or.exe
windows10-2004-x64
1usb-loader...lp.chm
windows7-x64
1usb-loader...lp.chm
windows10-2004-x64
1usb-loader...ed.dll
windows7-x64
1usb-loader...ed.dll
windows10-2004-x64
1usb-loader/R3M.wdm
windows7-x64
3usb-loader/R3M.wdm
windows10-2004-x64
3usb-loader/R3X.wdm
windows7-x64
3usb-loader/R3X.wdm
windows10-2004-x64
3usb-loader...or.txt
windows7-x64
1usb-loader...or.txt
windows10-2004-x64
1usb-loader...nd.png
windows7-x64
3usb-loader...nd.png
windows10-2004-x64
3usb-loader...de.png
windows7-x64
3usb-loader...de.png
windows10-2004-x64
3usb-loader...08.gct
windows7-x64
3usb-loader...08.gct
windows10-2004-x64
3usb-loader...08.gct
windows7-x64
3usb-loader...08.gct
windows10-2004-x64
3usb-loader...8P.gct
windows7-x64
3usb-loader...8P.gct
windows10-2004-x64
3Analysis
-
max time kernel
152s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
21/05/2023, 11:44
Static task
static1
Behavioral task
behavioral1
Sample
CFGUSBLoaderHBCv70MODr78Multi.rar
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
CFGUSBLoaderHBCv70MODr78Multi.rar
Resource
win10v2004-20230221-en
Behavioral task
behavioral3
Sample
apps/usbloader/boot.dol
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
apps/usbloader/boot.dol
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
apps/usbloader/icon.png
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
apps/usbloader/icon.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
apps/usbloader/meta.xml
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
apps/usbloader/meta.xml
Resource
win10v2004-20230221-en
Behavioral task
behavioral9
Sample
apps/usbloader/sample_config.txt
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
apps/usbloader/sample_config.txt
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
usb-loader/CfgLoaderConfigurator.exe
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
usb-loader/CfgLoaderConfigurator.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
usb-loader/ConfiguratorHelp.chm
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
usb-loader/ConfiguratorHelp.chm
Resource
win10v2004-20230221-en
Behavioral task
behavioral15
Sample
usb-loader/Ionic.Zip.Reduced.dll
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
usb-loader/Ionic.Zip.Reduced.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
usb-loader/R3M.wdm
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
usb-loader/R3M.wdm
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
usb-loader/R3X.wdm
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
usb-loader/R3X.wdm
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
usb-loader/Readme-Configurator.txt
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
usb-loader/Readme-Configurator.txt
Resource
win10v2004-20230220-en
Behavioral task
behavioral23
Sample
usb-loader/background.png
Resource
win7-20230220-en
Behavioral task
behavioral24
Sample
usb-loader/background.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral25
Sample
usb-loader/background_wide.png
Resource
win7-20230220-en
Behavioral task
behavioral26
Sample
usb-loader/background_wide.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral27
Sample
usb-loader/codes/RF7J08.gct
Resource
win7-20230220-en
Behavioral task
behavioral28
Sample
usb-loader/codes/RF7J08.gct
Resource
win10v2004-20230220-en
Behavioral task
behavioral29
Sample
usb-loader/codes/RINE08.gct
Resource
win7-20230220-en
Behavioral task
behavioral30
Sample
usb-loader/codes/RINE08.gct
Resource
win10v2004-20230220-en
Behavioral task
behavioral31
Sample
usb-loader/codes/RSVE8P.gct
Resource
win7-20230220-en
Behavioral task
behavioral32
Sample
usb-loader/codes/RSVE8P.gct
Resource
win10v2004-20230220-en
General
-
Target
usb-loader/codes/RF7J08.gct
-
Size
24B
-
MD5
f05585b59a97b2d4ccb924d3cdfd76eb
-
SHA1
9c36c748ce3b8b1a10ed47c83d98d32102b10b52
-
SHA256
aca1e213cf838d7ec20068f2f9f7388ab81510e785f5b486b794d293f5ba66c2
-
SHA512
f720e327bba09f82f21dd299e23909662d9f70b21b9542f4398ea3bc8cfd154fa1baff8541d658c1aecc241ddb772ed4da0dcf48046589babd7d5a3cd3590f0a
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\gct_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\.gct rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\gct_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\gct_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\.gct\ = "gct_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\gct_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\gct_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\gct_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 856 AcroRd32.exe 856 AcroRd32.exe 856 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 820 wrote to memory of 556 820 cmd.exe 28 PID 820 wrote to memory of 556 820 cmd.exe 28 PID 820 wrote to memory of 556 820 cmd.exe 28 PID 556 wrote to memory of 856 556 rundll32.exe 29 PID 556 wrote to memory of 856 556 rundll32.exe 29 PID 556 wrote to memory of 856 556 rundll32.exe 29 PID 556 wrote to memory of 856 556 rundll32.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\usb-loader\codes\RF7J08.gct1⤵
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\usb-loader\codes\RF7J08.gct2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\usb-loader\codes\RF7J08.gct"3⤵
- Suspicious use of SetWindowsHookEx
PID:856
-
-