Analysis
-
max time kernel
600s -
max time network
364s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
23/07/2023, 17:46
Static task
static1
Behavioral task
behavioral1
Sample
Plinko Adventure_1.0_Apkpure.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
Plinko Adventure_1.0_Apkpure.apk
Resource
android-x64-20230621-en
Behavioral task
behavioral3
Sample
Plinko Adventure_1.0_Apkpure.apk
Resource
android-x64-arm64-20230621-en
Behavioral task
behavioral4
Sample
baseline.prof
Resource
win7-20230712-en
Behavioral task
behavioral5
Sample
baseline.prof
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
baseline.profm
Resource
win7-20230712-en
Behavioral task
behavioral7
Sample
baseline.profm
Resource
win10v2004-20230703-en
General
-
Target
baseline.prof
-
Size
1KB
-
MD5
d9f897c05baeb9b422417e3adcdc2fee
-
SHA1
6a28a4f0d50e979705433a2c6e8314a4bd5295dc
-
SHA256
fc3fc391b3f28a2cc97264eb5f6c716be8965c8102f25bead3b131792ee4de03
-
SHA512
0c31aab71b8459bc37499329854e4a90f4f16b09fbf594b993b2da8b229f319ac6723c25b05611112fd0530dd44de2b2966538fdf57bb0fc12f574bc7645b5b8
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000_CLASSES\prof_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000_CLASSES\.prof rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000_CLASSES\prof_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000_CLASSES\.prof\ = "prof_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000_CLASSES\prof_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000_CLASSES\prof_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000_CLASSES\prof_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000_CLASSES\prof_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2880 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2880 AcroRd32.exe 2880 AcroRd32.exe 2880 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2884 2148 cmd.exe 29 PID 2148 wrote to memory of 2884 2148 cmd.exe 29 PID 2148 wrote to memory of 2884 2148 cmd.exe 29 PID 2884 wrote to memory of 2880 2884 rundll32.exe 30 PID 2884 wrote to memory of 2880 2884 rundll32.exe 30 PID 2884 wrote to memory of 2880 2884 rundll32.exe 30 PID 2884 wrote to memory of 2880 2884 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\baseline.prof1⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\baseline.prof2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\baseline.prof"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2880
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58e1a965c0879ed37405cb11477419634
SHA1b00a488046721d5c414a62a2db457395496669ff
SHA25654c00b34047e0bd4a60dccbcd37bb27c66d6483cd4842845b56a21a2f95855c8
SHA512e882cf4acc53edea8e0be69e0f3204b8288fa9295604b1afb92cc3da1ae86a83809ad3a1d45db16cdd534e58f89aab78f1a9b327a8ae61e99758dc2d47633dc1