Overview
overview
3Static
static
3English.zip
windows7-x64
1English.zip
windows10-2004-x64
1English/En...ns.exe
windows7-x64
English/En...ns.exe
windows10-2004-x64
English/En...r2.p3d
windows7-x64
3English/En...r2.p3d
windows10-2004-x64
3English/En...og.rcf
windows7-x64
3English/En...og.rcf
windows10-2004-x64
3Analysis
-
max time kernel
151s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
26-05-2023 23:33
Static task
static1
Behavioral task
behavioral1
Sample
English.zip
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
English.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
English/English/Simpsons.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
English/English/Simpsons.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
English/English/art/frontend/scrooby/resource/txtbible/srr2.p3d
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
English/English/art/frontend/scrooby/resource/txtbible/srr2.p3d
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
English/English/dialog.rcf
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
English/English/dialog.rcf
Resource
win10v2004-20230220-en
General
-
Target
English/English/dialog.rcf
-
Size
165.0MB
-
MD5
da274fc3bacfd0a4acd9d40b9ffb5d40
-
SHA1
6ad3395b95d33120fb32296575cc02aced6b7313
-
SHA256
4ff3745ba8bfa31c46940a69216beea8eff8c4b3f87d4aec56bad84e22c26869
-
SHA512
f528d3dc5b8a57357a5456b5113dea796c4c2dfdf9743b26cce6a7ab231cf5b4da6f470109dc167da5360e02117803a036cd04df5f4d30ea5dc117e04ad3e521
-
SSDEEP
3145728:3pTDuNgzvGVtfS3SwFyKtJUwWtBwAt13Lf7Yoy8AJSolzYv4chu:ZTugzOVaFVoDt1zYT8ApxYTu
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\rcf_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\.rcf\ = "rcf_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\rcf_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\rcf_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\rcf_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\rcf_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\.rcf rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\rcf_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1524 AcroRd32.exe 1524 AcroRd32.exe 1524 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1272 wrote to memory of 1728 1272 cmd.exe 29 PID 1272 wrote to memory of 1728 1272 cmd.exe 29 PID 1272 wrote to memory of 1728 1272 cmd.exe 29 PID 1728 wrote to memory of 1524 1728 rundll32.exe 30 PID 1728 wrote to memory of 1524 1728 rundll32.exe 30 PID 1728 wrote to memory of 1524 1728 rundll32.exe 30 PID 1728 wrote to memory of 1524 1728 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\English\English\dialog.rcf1⤵
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\English\English\dialog.rcf2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\English\English\dialog.rcf"3⤵
- Suspicious use of SetWindowsHookEx
PID:1524
-
-