Overview
overview
3Static
static
1Season Pass.7z
windows7-x64
3Season Pass.7z
windows10-2004-x64
3Season Pas...u8.lua
windows7-x64
3Season Pas...u8.lua
windows10-2004-x64
3Season Pas...ux.lua
windows7-x64
3Season Pas...ux.lua
windows10-2004-x64
3Season Pas...header
windows7-x64
3Season Pas...header
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
22/05/2023, 20:24
Static task
static1
Behavioral task
behavioral1
Sample
Season Pass.7z
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Season Pass.7z
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Season Pass/00000002/DCD596DA00A14B7986331BBC26355D106076D1A458/Archive/_resdesc_50_MultiPack1thru8.lua
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
Season Pass/00000002/DCD596DA00A14B7986331BBC26355D106076D1A458/Archive/_resdesc_50_MultiPack1thru8.lua
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
Season Pass/00000002/DCD596DA00A14B7986331BBC26355D106076D1A458/_rescdesc_50_version_spdelux.lua
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
Season Pass/00000002/DCD596DA00A14B7986331BBC26355D106076D1A458/_rescdesc_50_version_spdelux.lua
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
Season Pass/Headers/00000002/DCD596DA00A14B7986331BBC26355D106076D1A458.header
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
Season Pass/Headers/00000002/DCD596DA00A14B7986331BBC26355D106076D1A458.header
Resource
win10v2004-20230220-en
General
-
Target
Season Pass/00000002/DCD596DA00A14B7986331BBC26355D106076D1A458/_rescdesc_50_version_spdelux.lua
-
Size
134B
-
MD5
7af895658edf31d25438c79e2e4699af
-
SHA1
97d5e02fbb963cb101ff1e6061d7acc40a840b97
-
SHA256
5e391bd84c67f45f6cd68793d225640a93736cb8acbc89f50442cbac25f198b1
-
SHA512
34b558e602e84800f7a140aa73cadc818bbc415a83f7ad429873a6bbc9d69dbc524a131b9d1ede400046344c2897d69c48b631360b22cee5b479dae9c5bf2b6f
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\lua_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\lua_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\lua_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\.lua\ = "lua_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\lua_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\.lua rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\lua_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\lua_auto_file\shell\Read\command rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 580 AcroRd32.exe 580 AcroRd32.exe 580 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1996 wrote to memory of 1780 1996 cmd.exe 28 PID 1996 wrote to memory of 1780 1996 cmd.exe 28 PID 1996 wrote to memory of 1780 1996 cmd.exe 28 PID 1780 wrote to memory of 580 1780 rundll32.exe 29 PID 1780 wrote to memory of 580 1780 rundll32.exe 29 PID 1780 wrote to memory of 580 1780 rundll32.exe 29 PID 1780 wrote to memory of 580 1780 rundll32.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Season Pass\00000002\DCD596DA00A14B7986331BBC26355D106076D1A458\_rescdesc_50_version_spdelux.lua"1⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Season Pass\00000002\DCD596DA00A14B7986331BBC26355D106076D1A458\_rescdesc_50_version_spdelux.lua2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Season Pass\00000002\DCD596DA00A14B7986331BBC26355D106076D1A458\_rescdesc_50_version_spdelux.lua"3⤵
- Suspicious use of SetWindowsHookEx
PID:580
-
-