Overview
overview
9Static
static
1Robot-Clon...-1.apk
android-9-x86
9Compat.browser
windows7-x64
3Compat.browser
windows10-2004-x64
3DefaultWsd...tor.js
windows7-x64
1DefaultWsd...tor.js
windows10-2004-x64
1boot.config
windows7-x64
3boot.config
windows10-2004-x64
3browscap.ini
windows7-x64
1browscap.ini
windows10-2004-x64
1config
windows7-x64
1config
windows10-2004-x64
1config.xml
windows7-x64
1config.xml
windows10-2004-x64
1data.unity3d
windows7-x64
3data.unity3d
windows10-2004-x64
3game.dat
windows7-x64
3game.dat
windows10-2004-x64
3machine.xml
windows7-x64
1machine.xml
windows10-2004-x64
1mscorlib.d...es.dat
windows7-x64
3mscorlib.d...es.dat
windows10-2004-x64
3settings.xml
windows7-x64
1settings.xml
windows10-2004-x64
1sharedasse...source
windows7-x64
3sharedasse...source
windows10-2004-x64
3sharedasse...source
windows7-x64
3sharedasse...source
windows10-2004-x64
3unity defa...ources
windows7-x64
1unity defa...ources
windows10-2004-x64
1web.xml
windows7-x64
1web.xml
windows10-2004-x64
1Analysis
-
max time kernel
301s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
07/11/2023, 06:53
Static task
static1
Behavioral task
behavioral1
Sample
Robot-Clone-Fight-Arena-1-0-1.apk
Resource
android-x86-arm-20231023-en
Behavioral task
behavioral2
Sample
Compat.browser
Resource
win7-20231023-en
Behavioral task
behavioral3
Sample
Compat.browser
Resource
win10v2004-20231025-en
Behavioral task
behavioral4
Sample
DefaultWsdlHelpGenerator.js
Resource
win7-20231023-en
Behavioral task
behavioral5
Sample
DefaultWsdlHelpGenerator.js
Resource
win10v2004-20231020-en
Behavioral task
behavioral6
Sample
boot.config
Resource
win7-20231020-en
Behavioral task
behavioral7
Sample
boot.config
Resource
win10v2004-20231023-en
Behavioral task
behavioral8
Sample
browscap.ini
Resource
win7-20231023-en
Behavioral task
behavioral9
Sample
browscap.ini
Resource
win10v2004-20231023-en
Behavioral task
behavioral10
Sample
config
Resource
win7-20231023-en
Behavioral task
behavioral11
Sample
config
Resource
win10v2004-20231020-en
Behavioral task
behavioral12
Sample
config.xml
Resource
win7-20231020-en
Behavioral task
behavioral13
Sample
config.xml
Resource
win10v2004-20231025-en
Behavioral task
behavioral14
Sample
data.unity3d
Resource
win7-20231020-en
Behavioral task
behavioral15
Sample
data.unity3d
Resource
win10v2004-20231023-en
Behavioral task
behavioral16
Sample
game.dat
Resource
win7-20231020-en
Behavioral task
behavioral17
Sample
game.dat
Resource
win10v2004-20231023-en
Behavioral task
behavioral18
Sample
machine.xml
Resource
win7-20231023-en
Behavioral task
behavioral19
Sample
machine.xml
Resource
win10v2004-20231020-en
Behavioral task
behavioral20
Sample
mscorlib.dll-resources.dat
Resource
win7-20231020-en
Behavioral task
behavioral21
Sample
mscorlib.dll-resources.dat
Resource
win10v2004-20231025-en
Behavioral task
behavioral22
Sample
settings.xml
Resource
win7-20231023-en
Behavioral task
behavioral23
Sample
settings.xml
Resource
win10v2004-20231023-en
Behavioral task
behavioral24
Sample
sharedassets0.resource
Resource
win7-20231023-en
Behavioral task
behavioral25
Sample
sharedassets0.resource
Resource
win10v2004-20231023-en
Behavioral task
behavioral26
Sample
sharedassets1.resource
Resource
win7-20231020-en
Behavioral task
behavioral27
Sample
sharedassets1.resource
Resource
win10v2004-20231020-en
Behavioral task
behavioral28
Sample
unity default resources
Resource
win7-20231020-en
Behavioral task
behavioral29
Sample
unity default resources
Resource
win10v2004-20231025-en
Behavioral task
behavioral30
Sample
web.xml
Resource
win7-20231023-en
Behavioral task
behavioral31
Sample
web.xml
Resource
win10v2004-20231023-en
General
-
Target
Compat.browser
-
Size
1KB
-
MD5
0d831c1264b5b32a39fa347de368fe48
-
SHA1
187dff516f9448e63ea5078190b3347922c4b3eb
-
SHA256
8a1082057ac5681dcd4e9c227ed7fb8eb42ac1618963b5de3b65739dd77e2741
-
SHA512
4b7549eda1f8ed2c4533d056b62ca5030445393f9c6003e5ee47301ff7f44b4bd5022b74d54f571aa890b6e4593c6eded1a881500ac5ba2a720dc0ff280300af
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\.browser rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\.browser\ = "browser_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\browser_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\browser_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\browser_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\browser_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\browser_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\browser_auto_file\shell\Read rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2672 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2672 AcroRd32.exe 2672 AcroRd32.exe 2672 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2920 wrote to memory of 2740 2920 cmd.exe 29 PID 2920 wrote to memory of 2740 2920 cmd.exe 29 PID 2920 wrote to memory of 2740 2920 cmd.exe 29 PID 2740 wrote to memory of 2672 2740 rundll32.exe 30 PID 2740 wrote to memory of 2672 2740 rundll32.exe 30 PID 2740 wrote to memory of 2672 2740 rundll32.exe 30 PID 2740 wrote to memory of 2672 2740 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Compat.browser1⤵
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Compat.browser2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Compat.browser"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2672
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ce8604ef9ad311593b6b7aadcf57edf2
SHA10d69ba9f274c4bbae8bc096aa2128ec94133898b
SHA2563f12877185623f209e401c16fd993a9e2aae7842889701091453040731f3fffb
SHA5128ad2a0e509f7cce296661b63430356d98d981c06a1ef5facd73b3dc8c89fe8fdde38b30ced51b13acad6d52d1627d2a0f7c8bf2718d4acbc05e1e228e9b226da