Overview
overview
7Static
static
7HappyMod-M...-2.apk
android-9-x86
7HappyMod-M...-2.apk
android-10-x64
7.channel
windows7-x64
3.channel
windows10-2004-x64
30OO00l111l1l
windows7-x64
10OO00l111l1l
windows10-2004-x64
1baseline.prof
windows7-x64
3baseline.prof
windows10-2004-x64
3baseline.profm
windows7-x64
3baseline.profm
windows10-2004-x64
3data.json
windows7-x64
3data.json
windows10-2004-x64
3demo.html
windows7-x64
1demo.html
windows10-2004-x64
1filedownlo...erties
windows7-x64
3filedownlo...erties
windows10-2004-x64
3happygame.js
windows7-x64
1happygame.js
windows10-2004-x64
1img_0.png
windows7-x64
3img_0.png
windows10-2004-x64
3img_1.png
windows7-x64
3img_1.png
windows10-2004-x64
3img_10.png
windows7-x64
3img_10.png
windows10-2004-x64
3img_11.png
windows7-x64
3img_11.png
windows10-2004-x64
3img_12.png
windows7-x64
3img_12.png
windows10-2004-x64
3img_2.png
windows7-x64
3img_2.png
windows10-2004-x64
3img_3.png
windows7-x64
3img_3.png
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
28/08/2023, 18:29
Static task
static1
Behavioral task
behavioral1
Sample
HappyMod-Multilang-3-0-2.apk
Resource
android-x86-arm-20230824-en
Behavioral task
behavioral2
Sample
HappyMod-Multilang-3-0-2.apk
Resource
android-x64-20230824-en
Behavioral task
behavioral3
Sample
.channel
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
.channel
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
0OO00l111l1l
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
0OO00l111l1l
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
baseline.prof
Resource
win7-20230712-en
Behavioral task
behavioral8
Sample
baseline.prof
Resource
win10v2004-20230703-en
Behavioral task
behavioral9
Sample
baseline.profm
Resource
win7-20230712-en
Behavioral task
behavioral10
Sample
baseline.profm
Resource
win10v2004-20230703-en
Behavioral task
behavioral11
Sample
data.json
Resource
win7-20230712-en
Behavioral task
behavioral12
Sample
data.json
Resource
win10v2004-20230703-en
Behavioral task
behavioral13
Sample
demo.html
Resource
win7-20230712-en
Behavioral task
behavioral14
Sample
demo.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral15
Sample
filedownloader.properties
Resource
win7-20230712-en
Behavioral task
behavioral16
Sample
filedownloader.properties
Resource
win10v2004-20230703-en
Behavioral task
behavioral17
Sample
happygame.js
Resource
win7-20230712-en
Behavioral task
behavioral18
Sample
happygame.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral19
Sample
img_0.png
Resource
win7-20230712-en
Behavioral task
behavioral20
Sample
img_0.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral21
Sample
img_1.png
Resource
win7-20230712-en
Behavioral task
behavioral22
Sample
img_1.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral23
Sample
img_10.png
Resource
win7-20230712-en
Behavioral task
behavioral24
Sample
img_10.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral25
Sample
img_11.png
Resource
win7-20230712-en
Behavioral task
behavioral26
Sample
img_11.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral27
Sample
img_12.png
Resource
win7-20230824-en
Behavioral task
behavioral28
Sample
img_12.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral29
Sample
img_2.png
Resource
win7-20230712-en
Behavioral task
behavioral30
Sample
img_2.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral31
Sample
img_3.png
Resource
win7-20230712-en
Behavioral task
behavioral32
Sample
img_3.png
Resource
win10v2004-20230703-en
General
-
Target
.channel
-
Size
45B
-
MD5
5a4d6bcefa1daa4a8695bd48885c2ad2
-
SHA1
5022b264ef54581ca56baa67f19645f8c0a52be3
-
SHA256
a5e091a2ca79be0453029dc0b40d7e23c680984f82bd398a3def9e082063f30a
-
SHA512
4b8cac6d50b6284511940751012932152de434a2b0b2901f557cb288c15b357f7330596c2d5e96b49bd7fc5056a1d6b6c17302eaafac0ef20e416ecca5af1f87
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\channel_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\.channel\ = "channel_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\channel_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\channel_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\channel_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\channel_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\channel_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\.channel rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2784 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2784 AcroRd32.exe 2784 AcroRd32.exe 2784 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1576 wrote to memory of 2776 1576 cmd.exe 29 PID 1576 wrote to memory of 2776 1576 cmd.exe 29 PID 1576 wrote to memory of 2776 1576 cmd.exe 29 PID 2776 wrote to memory of 2784 2776 rundll32.exe 30 PID 2776 wrote to memory of 2784 2776 rundll32.exe 30 PID 2776 wrote to memory of 2784 2776 rundll32.exe 30 PID 2776 wrote to memory of 2784 2776 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\.channel1⤵
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\.channel2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\.channel"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2784
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD548abd53eaad83d6a9cdd3fc535fcf566
SHA15f406e87b43125a85e368d2a816ddb368f8fc9bd
SHA25607e565605bb45154c1ae82162eae93c060bebc99ebe420469468fd650d26e9ce
SHA5126b1ffde3304dae81b7a39bd30abc35d32748a935c78af01c2b8ed5e863adce41221e5fb33158882195bf7ef9ce5b5086c6b885fb850df1ca8a3bbeb82f0ab1e9