Overview
overview
7Static
static
7FunGame.apk
android-9-x86
1Android
windows7-x64
1Android
windows10-2004-x64
1Android.manifest
windows7-x64
3Android.manifest
windows10-2004-x64
3GameSkins.xml
windows7-x64
1GameSkins.xml
windows10-2004-x64
1LobbyData.xml
windows7-x64
1LobbyData.xml
windows10-2004-x64
1PokerNewFeatures.xml
windows7-x64
1PokerNewFeatures.xml
windows10-2004-x64
1RuntimeIni...s.json
windows7-x64
3RuntimeIni...s.json
windows10-2004-x64
3ScriptingA...s.json
windows7-x64
3ScriptingA...s.json
windows10-2004-x64
3Settings.xml
windows7-x64
1Settings.xml
windows10-2004-x64
1TeenPattiG...ns.xml
windows7-x64
1TeenPattiG...ns.xml
windows10-2004-x64
1TeenPattiN...es.xml
windows7-x64
1TeenPattiN...es.xml
windows10-2004-x64
1TeenPattiUserData.xml
windows7-x64
1TeenPattiUserData.xml
windows10-2004-x64
1UserData.xml
windows7-x64
1UserData.xml
windows10-2004-x64
1appbackgroundstheme2d
windows7-x64
1appbackgroundstheme2d
windows10-2004-x64
1appbackgro...nifest
windows7-x64
3appbackgro...nifest
windows10-2004-x64
3boot.config
windows7-x64
3boot.config
windows10-2004-x64
3data.unity3d
windows7-x64
3Analysis
-
max time kernel
163s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
16/11/2023, 09:02
Static task
static1
Behavioral task
behavioral1
Sample
FunGame.apk
Resource
android-x86-arm-20231023-en
Behavioral task
behavioral2
Sample
Android
Resource
win7-20231020-en
Behavioral task
behavioral3
Sample
Android
Resource
win10v2004-20231020-en
Behavioral task
behavioral4
Sample
Android.manifest
Resource
win7-20231023-en
Behavioral task
behavioral5
Sample
Android.manifest
Resource
win10v2004-20231020-en
Behavioral task
behavioral6
Sample
GameSkins.xml
Resource
win7-20231025-en
Behavioral task
behavioral7
Sample
GameSkins.xml
Resource
win10v2004-20231023-en
Behavioral task
behavioral8
Sample
LobbyData.xml
Resource
win7-20231023-en
Behavioral task
behavioral9
Sample
LobbyData.xml
Resource
win10v2004-20231020-en
Behavioral task
behavioral10
Sample
PokerNewFeatures.xml
Resource
win7-20231020-en
Behavioral task
behavioral11
Sample
PokerNewFeatures.xml
Resource
win10v2004-20231025-en
Behavioral task
behavioral12
Sample
RuntimeInitializeOnLoads.json
Resource
win7-20231023-en
Behavioral task
behavioral13
Sample
RuntimeInitializeOnLoads.json
Resource
win10v2004-20231020-en
Behavioral task
behavioral14
Sample
ScriptingAssemblies.json
Resource
win7-20231023-en
Behavioral task
behavioral15
Sample
ScriptingAssemblies.json
Resource
win10v2004-20231023-en
Behavioral task
behavioral16
Sample
Settings.xml
Resource
win7-20231023-en
Behavioral task
behavioral17
Sample
Settings.xml
Resource
win10v2004-20231020-en
Behavioral task
behavioral18
Sample
TeenPattiGameSkins.xml
Resource
win7-20231020-en
Behavioral task
behavioral19
Sample
TeenPattiGameSkins.xml
Resource
win10v2004-20231020-en
Behavioral task
behavioral20
Sample
TeenPattiNewFeatures.xml
Resource
win7-20231025-en
Behavioral task
behavioral21
Sample
TeenPattiNewFeatures.xml
Resource
win10v2004-20231023-en
Behavioral task
behavioral22
Sample
TeenPattiUserData.xml
Resource
win7-20231023-en
Behavioral task
behavioral23
Sample
TeenPattiUserData.xml
Resource
win10v2004-20231023-en
Behavioral task
behavioral24
Sample
UserData.xml
Resource
win7-20231023-en
Behavioral task
behavioral25
Sample
UserData.xml
Resource
win10v2004-20231023-en
Behavioral task
behavioral26
Sample
appbackgroundstheme2d
Resource
win7-20231020-en
Behavioral task
behavioral27
Sample
appbackgroundstheme2d
Resource
win10v2004-20231020-en
Behavioral task
behavioral28
Sample
appbackgroundstheme2d.manifest
Resource
win7-20231025-en
Behavioral task
behavioral29
Sample
appbackgroundstheme2d.manifest
Resource
win10v2004-20231023-en
Behavioral task
behavioral30
Sample
boot.config
Resource
win7-20231020-en
Behavioral task
behavioral31
Sample
boot.config
Resource
win10v2004-20231023-en
Behavioral task
behavioral32
Sample
data.unity3d
Resource
win7-20231020-en
General
-
Target
boot.config
-
Size
183B
-
MD5
c304e51081727c9ccca00fd1b855bb27
-
SHA1
d80daa53c1f057ae755e7f970ec45a4c4fac1b18
-
SHA256
d2b49301986fae9cdf19f50fde45df7f86945f17c9e58fa06b03a89c16a400cf
-
SHA512
8e1d189277c0e6bfab6fcc17408578e0b4cd20fed47f089a5e08126ac64b88513821286a2461a61f551443714d7f8bdf5e4538dd4161ba90eadfd30995291972
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2620 AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2620 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2620 AcroRd32.exe 2620 AcroRd32.exe 2620 AcroRd32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2620 2164 cmd.exe 28 PID 2164 wrote to memory of 2620 2164 cmd.exe 28 PID 2164 wrote to memory of 2620 2164 cmd.exe 28 PID 2164 wrote to memory of 2620 2164 cmd.exe 28
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\boot.config1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\boot.config"2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD532201ecd3c2e003707a1a7b1be25f432
SHA19dc2199682da64000fc1f47d98ec531e43e2c862
SHA2563d636e2a6824c724565ce1ada7dbc76618ec94ebcf013bae3646dcbc9666106d
SHA512cd4c88c950e5a15dd8b021a9f5441699f93a1176eee8ecff0d9700b23e3150b1681c444d24fa4659563d0b5e8e2e0f7bd9f8a6424dfde02d6142061f48fe5121