Overview
overview
7Static
static
7GB_b19741fxj.apk
android-9-x86
Norican-Regular.ttf
windows7-x64
3Norican-Regular.ttf
windows10-2004-x64
7Norican.ttf
windows7-x64
3Norican.ttf
windows10-2004-x64
7YOWA.html
windows7-x64
1YOWA.html
windows10-2004-x64
1changelog-ar.html
windows7-x64
1changelog-ar.html
windows10-2004-x64
1changelog.html
windows7-x64
changelog.html
windows10-2004-x64
1cl-message...erties
windows7-x64
3cl-message...erties
windows10-2004-x64
3clockDarkTheme.xml
windows7-x64
1clockDarkTheme.xml
windows10-2004-x64
1clockLightTheme.xml
windows7-x64
1clockLightTheme.xml
windows10-2004-x64
1credits.html
windows7-x64
1credits.html
windows10-2004-x64
animations...6.json
windows7-x64
3animations...6.json
windows10-2004-x64
3manifest.json
windows7-x64
3manifest.json
windows10-2004-x64
3ic_content...on.xml
windows7-x64
1ic_content...on.xml
windows10-2004-x64
1ic_content...ck.xml
windows7-x64
ic_content...ck.xml
windows10-2004-x64
1ic_content...ck.xml
windows7-x64
1ic_content...ck.xml
windows10-2004-x64
1ic_content...ld.xml
windows7-x64
1ic_content...ld.xml
windows10-2004-x64
1l17846d7a_a32.so
debian-9-armhf
1Resubmissions
06-07-2023 18:35
230706-w8fqlsdg43 706-07-2023 18:32
230706-w6mfdadg35 706-07-2023 18:27
230706-w34kgsdg32 705-07-2023 09:21
230705-lbqjfabd66 705-07-2023 08:59
230705-kxxdfach7v 705-07-2023 08:41
230705-klwmrscg9y 705-07-2023 07:15
230705-h3aqhscf6z 705-07-2023 07:13
230705-h2e9lsba95 705-07-2023 06:50
230705-hl6fvscf2t 7Analysis
-
max time kernel
242s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
05-07-2023 08:41
Static task
static1
Behavioral task
behavioral1
Sample
GB_b19741fxj.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
Norican-Regular.ttf
Resource
win7-20230703-en
Behavioral task
behavioral3
Sample
Norican-Regular.ttf
Resource
win10v2004-20230703-en
Behavioral task
behavioral4
Sample
Norican.ttf
Resource
win7-20230703-en
Behavioral task
behavioral5
Sample
Norican.ttf
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
YOWA.html
Resource
win7-20230703-en
Behavioral task
behavioral7
Sample
YOWA.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
changelog-ar.html
Resource
win7-20230703-en
Behavioral task
behavioral9
Sample
changelog-ar.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
changelog.html
Resource
win7-20230621-en
Behavioral task
behavioral11
Sample
changelog.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral12
Sample
cl-messages_en_us.properties
Resource
win7-20230703-en
Behavioral task
behavioral13
Sample
cl-messages_en_us.properties
Resource
win10v2004-20230621-en
Behavioral task
behavioral14
Sample
clockDarkTheme.xml
Resource
win7-20230703-en
Behavioral task
behavioral15
Sample
clockDarkTheme.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral16
Sample
clockLightTheme.xml
Resource
win7-20230703-en
Behavioral task
behavioral17
Sample
clockLightTheme.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral18
Sample
credits.html
Resource
win7-20230703-en
Behavioral task
behavioral19
Sample
credits.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral20
Sample
animations/lf30_editor_cjab5ej6.json
Resource
win7-20230703-en
Behavioral task
behavioral21
Sample
animations/lf30_editor_cjab5ej6.json
Resource
win10v2004-20230703-en
Behavioral task
behavioral22
Sample
manifest.json
Resource
win7-20230703-en
Behavioral task
behavioral23
Sample
manifest.json
Resource
win10v2004-20230703-en
Behavioral task
behavioral24
Sample
ic_content_sticker_location.xml
Resource
win7-20230703-en
Behavioral task
behavioral25
Sample
ic_content_sticker_location.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral26
Sample
ic_content_sticker_location_60_percent_black.xml
Resource
win7-20230621-en
Behavioral task
behavioral27
Sample
ic_content_sticker_location_60_percent_black.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral28
Sample
ic_content_sticker_location_black.xml
Resource
win7-20230703-en
Behavioral task
behavioral29
Sample
ic_content_sticker_location_black.xml
Resource
win10v2004-20230621-en
Behavioral task
behavioral30
Sample
ic_content_sticker_location_emerald.xml
Resource
win7-20230703-en
Behavioral task
behavioral31
Sample
ic_content_sticker_location_emerald.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral32
Sample
l17846d7a_a32.so
Resource
debian9-armhf-20221111-en
General
-
Target
animations/lf30_editor_cjab5ej6.json
-
Size
41KB
-
MD5
891d8d9d1b99cc444ef159c72349097d
-
SHA1
493be2f3109c01243280c72893b21dba695871d1
-
SHA256
32f0f87470de304b244a7a87971466824a597b4433eed9fb193fc2063a9256df
-
SHA512
366524565d0c5e5fa53af454de2b17a2690b838fe8cbb908eabdad5c19915ab466c05bb9cd2ae113303bd453266e932b8089131b4274cb01138ad6b48c9c2b1e
-
SSDEEP
384:jGZC6H4WCtUBvnz0uCZd7OzGZC6H4WCtUrnz0uCZda/T3SVv/k/NBsM6jt+DVpv1:jzfHpczfxpYkIUk
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000_CLASSES\json_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000_CLASSES\json_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000_CLASSES\.json rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000_CLASSES\.json\ = "json_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000_CLASSES\json_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000_CLASSES\json_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000_CLASSES\json_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000_CLASSES\json_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 560 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 560 AcroRd32.exe 560 AcroRd32.exe 560 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2908 3008 cmd.exe 29 PID 3008 wrote to memory of 2908 3008 cmd.exe 29 PID 3008 wrote to memory of 2908 3008 cmd.exe 29 PID 2908 wrote to memory of 560 2908 rundll32.exe 30 PID 2908 wrote to memory of 560 2908 rundll32.exe 30 PID 2908 wrote to memory of 560 2908 rundll32.exe 30 PID 2908 wrote to memory of 560 2908 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\animations\lf30_editor_cjab5ej6.json1⤵
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\animations\lf30_editor_cjab5ej6.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\animations\lf30_editor_cjab5ej6.json"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:560
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f1905ab77223cf552e93322b4a715b2c
SHA173045ba5e43e9743f576c446eaf553dd97d5f317
SHA256ff6174b767d9e738606ce3be95aea7ba7e9163dceaafebdbdb1a34073d1014ab
SHA512816070e71f1aca2ea5009f5eeb0d2907d8cdf184c7ad34e0729a7b7309d7832279a01a5f863926b7869ef9e6cf9ee16a02598581bb885f8e0b3daab790d14ffa