Resubmissions
25/02/2024, 00:03
240225-achpfagh92 625/02/2024, 00:00
240225-aasfvsgh83 324/02/2024, 23:59
240224-31qdeahf8y 324/02/2024, 23:58
240224-31hnkagh74 324/02/2024, 23:55
240224-3ymjqsgh64 3Analysis
-
max time kernel
1s -
max time network
4s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/02/2024, 23:58
Static task
static1
Behavioral task
behavioral1
Sample
Apocalyptic Scene.blend
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Apocalyptic Scene.blend
Resource
win10v2004-20240221-en
General
-
Target
Apocalyptic Scene.blend
-
Size
13.4MB
-
MD5
1617222256ee74600e3757377f51f750
-
SHA1
acd5139104ae9ed0c2bbe0192335bf0e165b7633
-
SHA256
82896c8b0bf5664243c87abeaeba51d5ab3a61ee916ac8397ccbc712b042adf2
-
SHA512
b5b40bbda7025aa7549bb0849452ca7ac9996dcd9a67991dd1120c9a6dde2f40852fc77006d5966eae9cb345ec6e42a776a5e5308356bb3111b5d1e11a74326f
-
SSDEEP
98304:wVGnASBNIp4QveWw60mXxKfB1ar0jrxlTg5LpcOolWvhLD/xYwPO:wV2Q4Qa6+fC4DTgPcOq
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_Classes\Local Settings rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2848 wrote to memory of 1636 2848 cmd.exe 29 PID 2848 wrote to memory of 1636 2848 cmd.exe 29 PID 2848 wrote to memory of 1636 2848 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Apocalyptic Scene.blend"1⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Apocalyptic Scene.blend2⤵
- Modifies registry class
PID:1636
-