Overview
overview
3Static
static
1CFC_1705084090880.zip
windows7-x64
1CFC_1705084090880.zip
windows10-2004-x64
1BepInEx\pl...SE.txt
windows7-x64
1BepInEx\pl...SE.txt
windows10-2004-x64
1BepInEx\pl...ts.txt
windows7-x64
1BepInEx\pl...ts.txt
windows10-2004-x64
1BepInEx\pl...w.json
windows7-x64
3BepInEx\pl...w.json
windows10-2004-x64
3BepInEx\pl...y.json
windows7-x64
3BepInEx\pl...y.json
windows10-2004-x64
3BepInEx\pl...s.json
windows7-x64
3BepInEx\pl...s.json
windows10-2004-x64
3BepInEx\pl...i.json
windows7-x64
3BepInEx\pl...i.json
windows10-2004-x64
3BepInEx\pl...o.json
windows7-x64
3BepInEx\pl...o.json
windows10-2004-x64
3BepInEx\pl...n.json
windows7-x64
3BepInEx\pl...n.json
windows10-2004-x64
3BepInEx\pl...n.json
windows7-x64
3BepInEx\pl...n.json
windows10-2004-x64
3BepInEx\pl...r.json
windows7-x64
3BepInEx\pl...r.json
windows10-2004-x64
3config/BepInEx.cfg
windows7-x64
3config/BepInEx.cfg
windows10-2004-x64
3export.r2x
windows7-x64
3export.r2x
windows10-2004-x64
3mods.yml
windows7-x64
3mods.yml
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12-01-2024 18:40
Static task
static1
Behavioral task
behavioral1
Sample
CFC_1705084090880.zip
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
CFC_1705084090880.zip
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
BepInEx\plugins\Ozone-Runtime_Netcode_Patcher\LICENSE.txt
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
BepInEx\plugins\Ozone-Runtime_Netcode_Patcher\LICENSE.txt
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
BepInEx\plugins\x753-More_Suits\moresuits\!more-suits.txt
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
BepInEx\plugins\x753-More_Suits\moresuits\!more-suits.txt
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
BepInEx\plugins\x753-More_Suits\moresuits\advanced\Glow.json
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
BepInEx\plugins\x753-More_Suits\moresuits\advanced\Glow.json
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
BepInEx\plugins\x753-More_Suits\moresuits\advanced\Kirby.json
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
BepInEx\plugins\x753-More_Suits\moresuits\advanced\Kirby.json
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
BepInEx\plugins\x753-More_Suits\moresuits\advanced\Knuckles.json
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
BepInEx\plugins\x753-More_Suits\moresuits\advanced\Knuckles.json
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
BepInEx\plugins\x753-More_Suits\moresuits\advanced\Luigi.json
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
BepInEx\plugins\x753-More_Suits\moresuits\advanced\Luigi.json
Resource
win10v2004-20231222-en
Behavioral task
behavioral15
Sample
BepInEx\plugins\x753-More_Suits\moresuits\advanced\Mario.json
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
BepInEx\plugins\x753-More_Suits\moresuits\advanced\Mario.json
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
BepInEx\plugins\x753-More_Suits\moresuits\advanced\Minion.json
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
BepInEx\plugins\x753-More_Suits\moresuits\advanced\Minion.json
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
BepInEx\plugins\x753-More_Suits\moresuits\advanced\Skeleton.json
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
BepInEx\plugins\x753-More_Suits\moresuits\advanced\Skeleton.json
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
BepInEx\plugins\x753-More_Suits\moresuits\advanced\Slayer.json
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
BepInEx\plugins\x753-More_Suits\moresuits\advanced\Slayer.json
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
config/BepInEx.cfg
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
config/BepInEx.cfg
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
export.r2x
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
export.r2x
Resource
win10v2004-20231222-en
Behavioral task
behavioral27
Sample
mods.yml
Resource
win7-20231129-en
Behavioral task
behavioral28
Sample
mods.yml
Resource
win10v2004-20231215-en
General
-
Target
mods.yml
-
Size
3KB
-
MD5
f3fde44a2f6d964d8ec24c265533a9fd
-
SHA1
02ba839c414440157fa620177d753aaa09b9ccad
-
SHA256
fa8204e79864418ea3f28e734caa6e40a312b2581bd63dc0197daf3b0d021702
-
SHA512
6ba53b217c1a0486fc9aefc04696ca146990018f2559f1389f5e66b306dfd2464c713b72bd3971be12550a92fb6d5b6891f421db7643068c48bca176c2043464
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\yml_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\yml_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\.yml rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\yml_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\yml_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\yml_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\yml_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\.yml\ = "yml_auto_file" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2584 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2584 AcroRd32.exe 2584 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2548 2924 cmd.exe 29 PID 2924 wrote to memory of 2548 2924 cmd.exe 29 PID 2924 wrote to memory of 2548 2924 cmd.exe 29 PID 2548 wrote to memory of 2584 2548 rundll32.exe 30 PID 2548 wrote to memory of 2584 2548 rundll32.exe 30 PID 2548 wrote to memory of 2584 2548 rundll32.exe 30 PID 2548 wrote to memory of 2584 2548 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\mods.yml1⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\mods.yml2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\mods.yml"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2584
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53d82c6ae4fe74805bd5429574af4dbea
SHA1961352f4529a76a7880e342fc777a4f9272eab67
SHA25626f86f9ba37027b3dc3161d850a301c0b5b3880b58dd3e7e2b3838d9f631c518
SHA5129b824553cd12b1c78551756041c0e885dd7824137605512f2bbd41d0ca16f607120bb374e7104eea4142b17199c741f886ca1cd86adee4def09fc0b24a3fcd2f