Overview
overview
7Static
static
3LOADER.rar
windows10-2004-x64
3LOADER/AlphaFS.dll
windows10-2004-x64
1LOADER/Loader.exe
windows10-2004-x64
7LOADER/libEGL.dll
windows10-2004-x64
1LOADER/mod...47.dll
windows10-2004-x64
1LOADER/swi...GL.dll
windows10-2004-x64
1LOADER/swi...v2.dll
windows10-2004-x64
1LOADER/vulkan-1.dll
windows10-2004-x64
1Resubmissions
31-10-2023 11:21
231031-ngcwmsff6w 7Analysis
-
max time kernel
229s -
max time network
232s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2023 11:21
Static task
static1
Behavioral task
behavioral1
Sample
LOADER.rar
Resource
win10v2004-20231023-en
Behavioral task
behavioral2
Sample
LOADER/AlphaFS.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
LOADER/Loader.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral4
Sample
LOADER/libEGL.dll
Resource
win10v2004-20231020-en
Behavioral task
behavioral5
Sample
LOADER/modules/x64/d3d/d3dcompiler_47.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral6
Sample
LOADER/swiftshader/libEGL.dll
Resource
win10v2004-20231020-en
Behavioral task
behavioral7
Sample
LOADER/swiftshader/libGLESv2.dll
Resource
win10v2004-20231020-en
Behavioral task
behavioral8
Sample
LOADER/vulkan-1.dll
Resource
win10v2004-20231020-en
General
-
Target
LOADER.rar
-
Size
9.9MB
-
MD5
53647cd383eccea76f4dc800fb51c722
-
SHA1
3ae7d6f2401da7addfc11dc479dc412ed83bc8b5
-
SHA256
9f874d738291a1eb1e519f68a999d0e6b59dc57acc57d652447fbb3f695a222a
-
SHA512
7176fb1299f26300e352807ae9b578868b2637616c401f0fdc849c78d753c2784c81a38d855b8122d6290ee4b4f4ee8ae7945a787193a3149b48494cb92c36c2
-
SSDEEP
196608:mzZzIuUK31VFpqi4q1t4R9Gsux765h9+eRXUfMHaGWsdgBbFMf3Nu:mzZzIuT3HFpj51o9nMuXTlBWBbFMf38
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 4064 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1692 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\LOADER.rar1⤵
- Modifies registry class
PID:2660
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1692
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3248
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD54486395e25947f7d97608649c61e291c
SHA13c343c43681269c392477d79010521e3ce0d6b81
SHA256b44b0e1cf29e780b9bb1c33bacc9db4806f12cc654bd4d0508e5719faef7e3bc
SHA512738ea4af7537b74b125fc51081cee3596be3880590a9970f75449bb9f03f2d436726f133de99d20510ebfed93c25356c2272e357c739adf4901c49f32f2cf10a