Overview
overview
3Static
static
3eduke32_wi...2f6.7z
windows7-x64
3eduke32_wi...2f6.7z
windows10-2004-x64
3SEHELP.hlp
windows7-x64
1SEHELP.hlp
windows10-2004-x64
1STHELP.hlp
windows7-x64
1STHELP.hlp
windows10-2004-x64
1buildlic.txt
windows7-x64
1buildlic.txt
windows10-2004-x64
1eduke32.exe
windows7-x64
3eduke32.exe
windows10-2004-x64
3gamecontrollerdb.txt
windows7-x64
1gamecontrollerdb.txt
windows10-2004-x64
1gpl-2.0.txt
windows7-x64
1gpl-2.0.txt
windows10-2004-x64
1m32help.hlp
windows7-x64
1m32help.hlp
windows10-2004-x64
1mapster32.exe
windows7-x64
1mapster32.exe
windows10-2004-x64
1names.h
windows7-x64
3names.h
windows10-2004-x64
3samples/_c...e0.map
windows7-x64
3samples/_c...e0.map
windows10-2004-x64
3samples/a.vbs
windows7-x64
1samples/a.vbs
windows10-2004-x64
1samples/aspect.map
windows7-x64
3samples/aspect.map
windows10-2004-x64
3samples/du...ts.vbs
windows7-x64
1samples/du...ts.vbs
windows10-2004-x64
1samples/m3...ex.map
windows7-x64
3samples/m3...ex.map
windows10-2004-x64
3samples/ma...er.map
windows7-x64
3samples/ma...er.map
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
09/10/2023, 20:34
Static task
static1
Behavioral task
behavioral1
Sample
eduke32_win32_20231007-10494-17844a2f6.7z
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
eduke32_win32_20231007-10494-17844a2f6.7z
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
SEHELP.hlp
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
SEHELP.hlp
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
STHELP.hlp
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
STHELP.hlp
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
buildlic.txt
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
buildlic.txt
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
eduke32.exe
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
eduke32.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral11
Sample
gamecontrollerdb.txt
Resource
win7-20230831-en
Behavioral task
behavioral12
Sample
gamecontrollerdb.txt
Resource
win10v2004-20230915-en
Behavioral task
behavioral13
Sample
gpl-2.0.txt
Resource
win7-20230831-en
Behavioral task
behavioral14
Sample
gpl-2.0.txt
Resource
win10v2004-20230915-en
Behavioral task
behavioral15
Sample
m32help.hlp
Resource
win7-20230831-en
Behavioral task
behavioral16
Sample
m32help.hlp
Resource
win10v2004-20230915-en
Behavioral task
behavioral17
Sample
mapster32.exe
Resource
win7-20230831-en
Behavioral task
behavioral18
Sample
mapster32.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral19
Sample
names.h
Resource
win7-20230831-en
Behavioral task
behavioral20
Sample
names.h
Resource
win10v2004-20230915-en
Behavioral task
behavioral21
Sample
samples/_clipshape0.map
Resource
win7-20230831-en
Behavioral task
behavioral22
Sample
samples/_clipshape0.map
Resource
win10v2004-20230915-en
Behavioral task
behavioral23
Sample
samples/a.vbs
Resource
win7-20230831-en
Behavioral task
behavioral24
Sample
samples/a.vbs
Resource
win10v2004-20230915-en
Behavioral task
behavioral25
Sample
samples/aspect.map
Resource
win7-20230831-en
Behavioral task
behavioral26
Sample
samples/aspect.map
Resource
win10v2004-20230915-en
Behavioral task
behavioral27
Sample
samples/dump_used_assets.vbs
Resource
win7-20230831-en
Behavioral task
behavioral28
Sample
samples/dump_used_assets.vbs
Resource
win10v2004-20230915-en
Behavioral task
behavioral29
Sample
samples/m32script_ex.map
Resource
win7-20230831-en
Behavioral task
behavioral30
Sample
samples/m32script_ex.map
Resource
win10v2004-20230915-en
Behavioral task
behavioral31
Sample
samples/mask_drawing_order.map
Resource
win7-20230831-en
Behavioral task
behavioral32
Sample
samples/mask_drawing_order.map
Resource
win10v2004-20230915-en
General
-
Target
eduke32_win32_20231007-10494-17844a2f6.7z
-
Size
4.0MB
-
MD5
5feb96ca3bdb4605e568df3446cca74f
-
SHA1
358ed6060e45c7371ee075b56d536252960b7002
-
SHA256
0d5daf0db9425d3b728def97f142534b0f2cef800006945aa61904205784c118
-
SHA512
4933b09f005372607118201d71393190fefcec8b23be05861cb1bcf5cad9ece95937358b1cb024d75bb5b3463064acee33dcc192ff2e435c5c292417f5d1f094
-
SSDEEP
98304:iOyFIgpdQ6GK9xbJO++814X+qwoCg7Q8pcP:itFIa1xbJOKOwo68p0
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_CLASSES\7z_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_CLASSES\7z_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_CLASSES\7z_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_CLASSES\7z_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_CLASSES\.7z rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_CLASSES\.7z\ = "7z_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_CLASSES\7z_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_CLASSES\7z_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2948 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2948 AcroRd32.exe 2948 AcroRd32.exe 2948 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2700 2212 cmd.exe 29 PID 2212 wrote to memory of 2700 2212 cmd.exe 29 PID 2212 wrote to memory of 2700 2212 cmd.exe 29 PID 2700 wrote to memory of 2948 2700 rundll32.exe 30 PID 2700 wrote to memory of 2948 2700 rundll32.exe 30 PID 2700 wrote to memory of 2948 2700 rundll32.exe 30 PID 2700 wrote to memory of 2948 2700 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\eduke32_win32_20231007-10494-17844a2f6.7z1⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\eduke32_win32_20231007-10494-17844a2f6.7z2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\eduke32_win32_20231007-10494-17844a2f6.7z"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2948
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD543642144f3c0b59ff577fb61923aca4f
SHA1f5f90ddb126129d3059a7e0547adba474fc1da67
SHA256f184b1556857d11273f37d6f21985a733bfbc0cceced17d795ebbde1c480534b
SHA512b34558d8177b941818ed817a310e978dba8e5cf533de68df40ed29c11dad0e46f73f2cb34f37dae66f7e60f2136f23856a5657ed2fa7d7a4f91e76df022c6d2b