Analysis
-
max time kernel
29s -
max time network
36s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
02/07/2023, 18:52
Static task
static1
Behavioral task
behavioral1
Sample
algo/Wii Sports (USA) (Rev 1).wbfs
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
algo/Wii Sports (USA) (Rev 1).wbfs
Resource
win10v2004-20230621-en
Behavioral task
behavioral3
Sample
algo/dolphin-x64-5.0.exe
Resource
win7-20230621-en
Behavioral task
behavioral4
Sample
algo/dolphin-x64-5.0.exe
Resource
win10v2004-20230621-en
General
-
Target
algo/Wii Sports (USA) (Rev 1).wbfs
-
Size
322.0MB
-
MD5
3ccd5bf4c6a836735658fbe365359c08
-
SHA1
b6ebbfc3f0d71cf89e1b1747622217a2ff477a90
-
SHA256
2c04d91806b63f92c46c58257a6e4c57b1a4fa37c577e774fab2c4da0e8e293c
-
SHA512
c9755a951d1536a65eca11ca94470de202e70c6732d2846f38031936d2e3413e572286e7c552520d77d77e823020bd117d754a232f7283158ec9540124598827
-
SSDEEP
6291456:b/JfEzbVO/hhoZFldWUak5tHvdbLN+MNb5pFe37:DYVSboXSjCHxNzbH437
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000_CLASSES\wbfs_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000_CLASSES\.wbfs\ = "wbfs_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000_CLASSES\wbfs_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000_CLASSES\wbfs_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000_CLASSES\.wbfs rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000_CLASSES\wbfs_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000_CLASSES\wbfs_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000_CLASSES\wbfs_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2012 AcroRd32.exe 2012 AcroRd32.exe 2012 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2036 wrote to memory of 432 2036 cmd.exe 29 PID 2036 wrote to memory of 432 2036 cmd.exe 29 PID 2036 wrote to memory of 432 2036 cmd.exe 29 PID 432 wrote to memory of 2012 432 rundll32.exe 30 PID 432 wrote to memory of 2012 432 rundll32.exe 30 PID 432 wrote to memory of 2012 432 rundll32.exe 30 PID 432 wrote to memory of 2012 432 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\algo\Wii Sports (USA) (Rev 1).wbfs"1⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\algo\Wii Sports (USA) (Rev 1).wbfs2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\algo\Wii Sports (USA) (Rev 1).wbfs"3⤵
- Suspicious use of SetWindowsHookEx
PID:2012
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5dc57af46b3245ebecc4403aab59d37c9
SHA1837ea66758a45d90a965f18c1f124f61616b71b1
SHA2568d1af64bb570240677cc4fa6d5329a476c02372caf62a8ac5b0a10451114fd1d
SHA5121c78bf7d8c9c070b0e1386641945ce996094158fb9b9ef0ff51f1a07390192047195a57b213f852c725c32d94799f2f1937e254cffdef4d6a8906cf136cf7936