Overview
overview
10Static
static
10Setup 2.1.exe
windows7-x64
10Setup 2.1.exe
windows10-2004-x64
10data.bin
windows7-x64
3data.bin
windows10-2004-x64
3libEGL.dll
windows7-x64
1libEGL.dll
windows10-2004-x64
1libeay32.dll
windows7-x64
1libeay32.dll
windows10-2004-x64
1libgcc_s_dw2-1.dll
windows7-x64
3libgcc_s_dw2-1.dll
windows10-2004-x64
3libwinpthread-1.dll
windows7-x64
1libwinpthread-1.dll
windows10-2004-x64
1msvcp100.dll
windows7-x64
3msvcp100.dll
windows10-2004-x64
3msvcp140.dll
windows7-x64
3msvcp140.dll
windows10-2004-x64
3msvcr100.dll
windows7-x64
3msvcr100.dll
windows10-2004-x64
3opengl32sw.dll
windows7-x64
1opengl32sw.dll
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
07-08-2023 11:53
Behavioral task
behavioral1
Sample
Setup 2.1.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Setup 2.1.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
data.bin
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
data.bin
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
libEGL.dll
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
libEGL.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
libeay32.dll
Resource
win7-20230712-en
Behavioral task
behavioral8
Sample
libeay32.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral9
Sample
libgcc_s_dw2-1.dll
Resource
win7-20230712-en
Behavioral task
behavioral10
Sample
libgcc_s_dw2-1.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral11
Sample
libwinpthread-1.dll
Resource
win7-20230712-en
Behavioral task
behavioral12
Sample
libwinpthread-1.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral13
Sample
msvcp100.dll
Resource
win7-20230712-en
Behavioral task
behavioral14
Sample
msvcp100.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral15
Sample
msvcp140.dll
Resource
win7-20230712-en
Behavioral task
behavioral16
Sample
msvcp140.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral17
Sample
msvcr100.dll
Resource
win7-20230712-en
Behavioral task
behavioral18
Sample
msvcr100.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral19
Sample
opengl32sw.dll
Resource
win7-20230712-en
Behavioral task
behavioral20
Sample
opengl32sw.dll
Resource
win10v2004-20230703-en
General
-
Target
data.bin
-
Size
19.0MB
-
MD5
ef0dda43daf11d6118a5310bee73f1cd
-
SHA1
f5455766f0b643a65e89cbd54ea8c090b9abe523
-
SHA256
d59cdc52efc57fcc6e0008290de2fc2b7ddb1c5c624ed747c87944723803df15
-
SHA512
b41f6354ca4998f801ddb9d9c46aad31ab18997d3c2271371bd7e5297be3490dfd1643dbacfea7ace523bbd60da296f30fea3a7dc629c7a0799353cca8a83fc8
-
SSDEEP
393216:sHqOpYyDx04MQFKWI3eeo0T2WedOOJUiZLJh+SuTnZv35Tv:sHqKDNJi3eWadjUiZLJASuTrv
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\.bin rundll32.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\bin_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\bin_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\bin_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\bin_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\bin_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\bin_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\.bin\ = "bin_auto_file" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid Process 2336 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
AcroRd32.exepid Process 2336 AcroRd32.exe 2336 AcroRd32.exe 2336 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid Process procid_target PID 1712 wrote to memory of 524 1712 cmd.exe 1 PID 1712 wrote to memory of 524 1712 cmd.exe 1 PID 1712 wrote to memory of 524 1712 cmd.exe 1 PID 524 wrote to memory of 2336 524 rundll32.exe 32 PID 524 wrote to memory of 2336 524 rundll32.exe 32 PID 524 wrote to memory of 2336 524 rundll32.exe 32 PID 524 wrote to memory of 2336 524 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\data.bin1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\data.bin"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2336
-
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\data.bin1⤵
- Suspicious use of WriteProcessMemory
PID:1712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ea3426c85d6b8f4a9546b5d0e0f8da05
SHA12b87e9a897044a280b2c5931c099aae93cd7eff2
SHA256d8ec5ab6cb1d6cc09e8d780ef78f2bae7068747dc346f06cfe0f951dafcc765e
SHA5120d42aa0f7fcd0fd9ed7ae923d8a91ceb8aa0fcf538d1f5a5e98ab85e3228d0455cb36cbf603d10126133c61fa08d3c92bfca546feda5d473f0ac743e9d3efbda