Overview
overview
3Static
static
1tmp/.org.c...f.puff
windows7-x64
3tmp/.org.c...f.puff
windows10-2004-x64
3tmp/.org.c...5.puff
windows7-x64
3tmp/.org.c...5.puff
windows10-2004-x64
3tmp/latte-...d.lock
windows7-x64
3tmp/latte-...d.lock
windows10-2004-x64
3tmp/latted...colors
windows7-x64
3tmp/latted...colors
windows10-2004-x64
3tmp/latted...colors
windows7-x64
3tmp/latted...colors
windows10-2004-x64
3tmp/new.schema
windows7-x64
3tmp/new.schema
windows10-2004-x64
3tmp/old.schema
windows7-x64
3tmp/old.schema
windows10-2004-x64
3tmp/packag...pdates
windows7-x64
1tmp/packag...pdates
windows10-2004-x64
1tmp/pip/_v...rt.pem
windows7-x64
3tmp/pip/_v...rt.pem
windows10-2004-x64
3tmp/v8-com...s.blob
windows7-x64
3tmp/v8-com...s.blob
windows10-2004-x64
3tmp/v8-com...js.map
windows7-x64
3tmp/v8-com...js.map
windows10-2004-x64
3tmp/v8-com...s.blob
windows7-x64
3tmp/v8-com...s.blob
windows10-2004-x64
3tmp/v8-com...js.map
windows7-x64
3tmp/v8-com...js.map
windows10-2004-x64
3tmp/v8-com...s.blob
windows7-x64
3tmp/v8-com...s.blob
windows10-2004-x64
3tmp/v8-com...js.map
windows7-x64
3tmp/v8-com...js.map
windows10-2004-x64
3tmp/xauth_CDXAAy
windows7-x64
1tmp/xauth_CDXAAy
windows10-2004-x64
1Analysis
-
max time kernel
152s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230824-en -
resource tags
arch:x64arch:x86image:win7-20230824-enlocale:en-usos:windows7-x64system -
submitted
29-08-2023 18:41
Static task
static1
Behavioral task
behavioral1
Sample
tmp/.org.chromium.Chromium.CIiP1D/4be5c8194aa6b4dce9271bdda525d0d8ba9b60b9fbee2b6ab9d7191bcf40deef.puff
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
tmp/.org.chromium.Chromium.CIiP1D/4be5c8194aa6b4dce9271bdda525d0d8ba9b60b9fbee2b6ab9d7191bcf40deef.puff
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
tmp/.org.chromium.Chromium.YAQUpl/afdc25a3e878826efbf18a52aec0c7f46d621ad17c28722054bc30d1607e1215.puff
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
tmp/.org.chromium.Chromium.YAQUpl/afdc25a3e878826efbf18a52aec0c7f46d621ad17c28722054bc30d1607e1215.puff
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
tmp/latte-dock.mrkd.lock
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
tmp/latte-dock.mrkd.lock
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
tmp/lattedock-mvHtAR/default.colors
Resource
win7-20230824-en
Behavioral task
behavioral8
Sample
tmp/lattedock-mvHtAR/default.colors
Resource
win10v2004-20230703-en
Behavioral task
behavioral9
Sample
tmp/lattedock-mvHtAR/reversed.colors
Resource
win7-20230712-en
Behavioral task
behavioral10
Sample
tmp/lattedock-mvHtAR/reversed.colors
Resource
win10v2004-20230703-en
Behavioral task
behavioral11
Sample
tmp/new.schema
Resource
win7-20230712-en
Behavioral task
behavioral12
Sample
tmp/new.schema
Resource
win10v2004-20230703-en
Behavioral task
behavioral13
Sample
tmp/old.schema
Resource
win7-20230712-en
Behavioral task
behavioral14
Sample
tmp/old.schema
Resource
win10v2004-20230824-en
Behavioral task
behavioral15
Sample
tmp/packagekit-alpm-updates
Resource
win7-20230712-en
Behavioral task
behavioral16
Sample
tmp/packagekit-alpm-updates
Resource
win10v2004-20230703-en
Behavioral task
behavioral17
Sample
tmp/pip/_vendor/certifi/cacert.pem
Resource
win7-20230712-en
Behavioral task
behavioral18
Sample
tmp/pip/_vendor/certifi/cacert.pem
Resource
win10v2004-20230703-en
Behavioral task
behavioral19
Sample
tmp/v8-compile-cache-1000/11.3.244.8-node.10/zShomezSmrkdzS.cachezSnodezScorepackzSyarnzS1.22.19zSbinzSyarn.js.blob
Resource
win7-20230712-en
Behavioral task
behavioral20
Sample
tmp/v8-compile-cache-1000/11.3.244.8-node.10/zShomezSmrkdzS.cachezSnodezScorepackzSyarnzS1.22.19zSbinzSyarn.js.blob
Resource
win10v2004-20230703-en
Behavioral task
behavioral21
Sample
tmp/v8-compile-cache-1000/11.3.244.8-node.10/zShomezSmrkdzS.cachezSnodezScorepackzSyarnzS1.22.19zSbinzSyarn.js.map
Resource
win7-20230712-en
Behavioral task
behavioral22
Sample
tmp/v8-compile-cache-1000/11.3.244.8-node.10/zShomezSmrkdzS.cachezSnodezScorepackzSyarnzS1.22.19zSbinzSyarn.js.map
Resource
win10v2004-20230703-en
Behavioral task
behavioral23
Sample
tmp/v8-compile-cache-1000/11.3.244.8-node.10/zSusrzSlibzSnode_moduleszScorepackzSdistzSpnpm.js.blob
Resource
win7-20230824-en
Behavioral task
behavioral24
Sample
tmp/v8-compile-cache-1000/11.3.244.8-node.10/zSusrzSlibzSnode_moduleszScorepackzSdistzSpnpm.js.blob
Resource
win10v2004-20230703-en
Behavioral task
behavioral25
Sample
tmp/v8-compile-cache-1000/11.3.244.8-node.10/zSusrzSlibzSnode_moduleszScorepackzSdistzSpnpm.js.map
Resource
win7-20230712-en
Behavioral task
behavioral26
Sample
tmp/v8-compile-cache-1000/11.3.244.8-node.10/zSusrzSlibzSnode_moduleszScorepackzSdistzSpnpm.js.map
Resource
win10v2004-20230703-en
Behavioral task
behavioral27
Sample
tmp/v8-compile-cache-1000/11.3.244.8-node.10/zSusrzSlibzSnode_moduleszScorepackzSdistzSyarn.js.blob
Resource
win7-20230712-en
Behavioral task
behavioral28
Sample
tmp/v8-compile-cache-1000/11.3.244.8-node.10/zSusrzSlibzSnode_moduleszScorepackzSdistzSyarn.js.blob
Resource
win10v2004-20230703-en
Behavioral task
behavioral29
Sample
tmp/v8-compile-cache-1000/11.3.244.8-node.10/zSusrzSlibzSnode_moduleszScorepackzSdistzSyarn.js.map
Resource
win7-20230712-en
Behavioral task
behavioral30
Sample
tmp/v8-compile-cache-1000/11.3.244.8-node.10/zSusrzSlibzSnode_moduleszScorepackzSdistzSyarn.js.map
Resource
win10v2004-20230824-en
Behavioral task
behavioral31
Sample
tmp/xauth_CDXAAy
Resource
win7-20230712-en
Behavioral task
behavioral32
Sample
tmp/xauth_CDXAAy
Resource
win10v2004-20230703-en
General
-
Target
tmp/lattedock-mvHtAR/default.colors
-
Size
3KB
-
MD5
cf9ca76de170dd4d78aef8dfa7e6ab16
-
SHA1
ba4301175abb8f36d803d87a74b663b57d97d815
-
SHA256
51cb3fc0f310bd5995c53501f9c05f25e8c8fa13d731f566798f0bb22036ad0d
-
SHA512
9f3bd8f9ec31fc41afaf88a2daa73ce9e3eef6ec5aec2753a54037d2481fd6113abb5d8829aa6670e0af67d77bdbe09da85f626ede19fb76177432161f0cf88e
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000_CLASSES\colors_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000_CLASSES\colors_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000_CLASSES\colors_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000_CLASSES\colors_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000_CLASSES\colors_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000_CLASSES\colors_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000_CLASSES\.colors rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000_CLASSES\.colors\ = "colors_auto_file" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2304 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2304 AcroRd32.exe 2304 AcroRd32.exe 2304 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2640 wrote to memory of 1304 2640 cmd.exe 31 PID 2640 wrote to memory of 1304 2640 cmd.exe 31 PID 2640 wrote to memory of 1304 2640 cmd.exe 31 PID 1304 wrote to memory of 2304 1304 rundll32.exe 32 PID 1304 wrote to memory of 2304 1304 rundll32.exe 32 PID 1304 wrote to memory of 2304 1304 rundll32.exe 32 PID 1304 wrote to memory of 2304 1304 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\tmp\lattedock-mvHtAR\default.colors1⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\tmp\lattedock-mvHtAR\default.colors2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\tmp\lattedock-mvHtAR\default.colors"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2304
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5bf914109dd3eedcdcc98a82f8f404398
SHA160be65f1bca0c1278368793ea500a3f1a90423bc
SHA256e617730f0eb945cf6f67cceb6ad9ca36fd6e59d69975e57fc248ae9232237e00
SHA5127930df009dae89769d57105eaa789ae0ac061ef429da23b2e119f562e1342b741cbdf57495ff660b98e494fccab4b666b21ee175e7f87530d200283990005d49