Overview
overview
3Static
static
1Browser.dmg
macos-10.15-amd64
1Arc-1-26-4..._store
windows7-x64
3Arc-1-26-4..._store
windows10-2004-x64
3Arc-1-26-4...nd.png
windows7-x64
3Arc-1-26-4...nd.png
windows10-2004-x64
3Arc-1-26-4...antine
windows7-x64
3Arc-1-26-4...antine
windows10-2004-x64
3Arc-1-26-4...-45413
macos-10.15-amd64
1Arc-1-26-4...3:rsrc
windows7-x64
1Arc-1-26-4...3:rsrc
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 04:54
Static task
static1
Behavioral task
behavioral1
Sample
Browser.dmg
Resource
macos-20231201-en
Behavioral task
behavioral2
Sample
Arc-1-26-45413/.ds_store
Resource
win7-20231215-en
Behavioral task
behavioral3
Sample
Arc-1-26-45413/.ds_store
Resource
win10v2004-20231215-en
Behavioral task
behavioral4
Sample
Arc-1-26-45413/.background/background.png
Resource
win7-20231215-en
Behavioral task
behavioral5
Sample
Arc-1-26-45413/.background/background.png
Resource
win10v2004-20231215-en
Behavioral task
behavioral6
Sample
Arc-1-26-45413/.background/background.png:com.apple.quarantine
Resource
win7-20231215-en
Behavioral task
behavioral7
Sample
Arc-1-26-45413/.background/background.png:com.apple.quarantine
Resource
win10v2004-20231222-en
Behavioral task
behavioral8
Sample
Arc-1-26-45413/Arc-1-26-45413
Resource
macos-20231201-en
Behavioral task
behavioral9
Sample
Arc-1-26-45413/Arc-1-26-45413:rsrc
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
Arc-1-26-45413/Arc-1-26-45413:rsrc
Resource
win10v2004-20231222-en
General
-
Target
Arc-1-26-45413/.ds_store
-
Size
10KB
-
MD5
5b602f5a74915be89456d1637889ffbf
-
SHA1
6516c1b8bf9113a407080470007d942a98655465
-
SHA256
1bf055eed75dcb1905a39314cb93d74529ab01c9d3ad1b63b372d241fa8695e4
-
SHA512
803b8c1c978d5bb8cb579cdc8e3368b77eeb9fd12792560da458971c1811fcaf4f544cc51187dceb6c7a524fd9ed48685b92417179d2f2c98f03b480febcaa41
-
SSDEEP
96:2g9gA3yuFojjb5oKbSGrj7P7HAnGyb5oKbSV:lJ3yukbSo0bSV
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\ds_store_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\ds_store_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\ds_store_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\ds_store_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\.ds_store rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\.ds_store\ = "ds_store_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\ds_store_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\ds_store_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2760 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2760 AcroRd32.exe 2760 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2500 wrote to memory of 3016 2500 cmd.exe 29 PID 2500 wrote to memory of 3016 2500 cmd.exe 29 PID 2500 wrote to memory of 3016 2500 cmd.exe 29 PID 3016 wrote to memory of 2760 3016 rundll32.exe 30 PID 3016 wrote to memory of 2760 3016 rundll32.exe 30 PID 3016 wrote to memory of 2760 3016 rundll32.exe 30 PID 3016 wrote to memory of 2760 3016 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Arc-1-26-45413\.ds_store1⤵
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Arc-1-26-45413\.ds_store2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Arc-1-26-45413\.ds_store"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2760
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD55851d3edfc8aed2697a3adbd44796fac
SHA1555a14d0e09f4acf9f15c9f865a2b66a0d7f0129
SHA2566badb5ab8bee11d5c847c04a73464fcd7d265873d92282189923c77a386415ae
SHA512f7e2ae8d42927496c11eadbaeccbee8bfc46b376b5fa300ab7b767747573053eb3935b8c74cdacc70efdc9bb04ed8ff416cf620e25e0db080da66da3e3ff0c14