Overview
overview
3Static
static
1X-Ray para...PE.zip
windows7-x64
1X-Ray para...PE.zip
windows10-2004-x64
1ABEL-XRAY ...er.txt
windows7-x64
1ABEL-XRAY ...er.txt
windows10-2004-x64
1ABEL-XRAY ...s.json
windows7-x64
3ABEL-XRAY ...s.json
windows10-2004-x64
3ABEL-XRAY ...t.json
windows7-x64
3ABEL-XRAY ...t.json
windows10-2004-x64
3ABEL-XRAY ...terial
windows7-x64
3ABEL-XRAY ...terial
windows10-2004-x64
3ABEL-XRAY ...on.png
windows7-x64
1ABEL-XRAY ...on.png
windows10-2004-x64
3ABEL-XRAY ...agment
windows7-x64
3ABEL-XRAY ...agment
windows10-2004-x64
3ABEL-XRAY ...vertex
windows7-x64
3ABEL-XRAY ...vertex
windows10-2004-x64
3ABEL-XRAY ...agment
windows7-x64
3ABEL-XRAY ...agment
windows10-2004-x64
3ABEL-XRAY ...agment
windows7-x64
3ABEL-XRAY ...agment
windows10-2004-x64
3ABEL-XRAY ...nt.old
windows7-x64
3ABEL-XRAY ...nt.old
windows10-2004-x64
3ABEL-XRAY ...agment
windows7-x64
3ABEL-XRAY ...agment
windows10-2004-x64
3ABEL-XRAY ...t.hlsl
windows7-x64
3ABEL-XRAY ...t.hlsl
windows10-2004-x64
1ABEL-XRAY ...x.hlsl
windows7-x64
3ABEL-XRAY ...x.hlsl
windows10-2004-x64
3ABEL-XRAY ...t.hlsl
windows7-x64
3ABEL-XRAY ...t.hlsl
windows10-2004-x64
3ABEL-XRAY ...sl.old
windows7-x64
3ABEL-XRAY ...sl.old
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 21:55
Static task
static1
Behavioral task
behavioral1
Sample
X-Ray para MCPE_CamiHacks MCPE.zip
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
X-Ray para MCPE_CamiHacks MCPE.zip
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
ABEL-XRAY 1.19/Leer.txt
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
ABEL-XRAY 1.19/Leer.txt
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
ABEL-XRAY 1.19/blocks.json
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
ABEL-XRAY 1.19/blocks.json
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
ABEL-XRAY 1.19/manifest.json
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
ABEL-XRAY 1.19/manifest.json
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
ABEL-XRAY 1.19/materials/ui3D.material
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
ABEL-XRAY 1.19/materials/ui3D.material
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
ABEL-XRAY 1.19/pack_icon.png
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
ABEL-XRAY 1.19/pack_icon.png
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
ABEL-XRAY 1.19/shaders/glsl/entity.fragment
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
ABEL-XRAY 1.19/shaders/glsl/entity.fragment
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
ABEL-XRAY 1.19/shaders/glsl/entity.vertex
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
ABEL-XRAY 1.19/shaders/glsl/entity.vertex
Resource
win10v2004-20231222-en
Behavioral task
behavioral17
Sample
ABEL-XRAY 1.19/shaders/glsl/flat_white.fragment
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
ABEL-XRAY 1.19/shaders/glsl/flat_white.fragment
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
ABEL-XRAY 1.19/shaders/glsl/renderchunk.fragment
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
ABEL-XRAY 1.19/shaders/glsl/renderchunk.fragment
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
ABEL-XRAY 1.19/shaders/glsl/renderchunk.fragment.old
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
ABEL-XRAY 1.19/shaders/glsl/renderchunk.fragment.old
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
ABEL-XRAY 1.19/shaders/glsl/selection_box.fragment
Resource
win7-20231129-en
Behavioral task
behavioral24
Sample
ABEL-XRAY 1.19/shaders/glsl/selection_box.fragment
Resource
win10v2004-20231222-en
Behavioral task
behavioral25
Sample
ABEL-XRAY 1.19/shaders/hlsl/entity.fragment.hlsl
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
ABEL-XRAY 1.19/shaders/hlsl/entity.fragment.hlsl
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
ABEL-XRAY 1.19/shaders/hlsl/entity.vertex.hlsl
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
ABEL-XRAY 1.19/shaders/hlsl/entity.vertex.hlsl
Resource
win10v2004-20231222-en
Behavioral task
behavioral29
Sample
ABEL-XRAY 1.19/shaders/hlsl/renderchunk.fragment.hlsl
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
ABEL-XRAY 1.19/shaders/hlsl/renderchunk.fragment.hlsl
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
ABEL-XRAY 1.19/shaders/hlsl/renderchunk.fragment.hlsl.old
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
ABEL-XRAY 1.19/shaders/hlsl/renderchunk.fragment.hlsl.old
Resource
win10v2004-20231222-en
General
-
Target
ABEL-XRAY 1.19/shaders/glsl/entity.fragment
-
Size
4KB
-
MD5
d5454589255cd02e0b46af40462c9af3
-
SHA1
5c0afbc8a7d5938e4b404eb8cc063fb4289a511e
-
SHA256
6d7bea6f8c497854920cc4f34fd0a3a3ffd72bbef62647f7f2eb0af1caf71f7f
-
SHA512
b410ef50602b519df91a99bce88b384029d0acd3784fbd8a38b95fdddc34a10f2b9fa66b3c1f8f93e30bfc07c0e67e68c21b077c860ce8645f0365475c6307ab
-
SSDEEP
96:mh1Z8AfRmkhwt2pibaOIrzmQVXOkY7/fSJh38tW:+Z8AZmQPK7xk2SD
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\fragment_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\fragment_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\fragment_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\fragment_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\.fragment rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\.fragment\ = "fragment_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\fragment_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\fragment_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2816 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2816 AcroRd32.exe 2816 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2708 2212 cmd.exe 29 PID 2212 wrote to memory of 2708 2212 cmd.exe 29 PID 2212 wrote to memory of 2708 2212 cmd.exe 29 PID 2708 wrote to memory of 2816 2708 rundll32.exe 30 PID 2708 wrote to memory of 2816 2708 rundll32.exe 30 PID 2708 wrote to memory of 2816 2708 rundll32.exe 30 PID 2708 wrote to memory of 2816 2708 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ABEL-XRAY 1.19\shaders\glsl\entity.fragment"1⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ABEL-XRAY 1.19\shaders\glsl\entity.fragment2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ABEL-XRAY 1.19\shaders\glsl\entity.fragment"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2816
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD536fb4aba78578cb1c207f52aff5b90ab
SHA1c090d81e6f326c677561cc7d5409373ffde6d587
SHA256651c69c6bc0775bee44a8e4f2a7e17bd153b212370a6093b67fa41cfafc2f0e3
SHA512ef607caba4c0bc651cf996f24b62613ee0aebefc2740c12e7c77c63a89e83247fd6e818441a3960c25a51e870d3245ae3c2da6917d5b33ce45cf1ee2556e4bcf