Overview
overview
3Static
static
15987995.zip
windows7-x64
15987995.zip
windows10-2004-x64
1Pal/Saved/...00.sav
windows7-x64
3Pal/Saved/...00.sav
windows10-2004-x64
3Pal/Saved/...00.sav
windows7-x64
3Pal/Saved/...00.sav
windows10-2004-x64
3Pal/Saved/...00.sav
windows7-x64
3Pal/Saved/...00.sav
windows10-2004-x64
3Pal/Saved/...00.sav
windows7-x64
3Pal/Saved/...00.sav
windows10-2004-x64
3Pal/Saved/...00.sav
windows7-x64
3Pal/Saved/...00.sav
windows10-2004-x64
3Pal/Saved/...00.sav
windows7-x64
3Pal/Saved/...00.sav
windows10-2004-x64
3Analysis
-
max time kernel
158s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-02-2024 10:33
Static task
static1
Behavioral task
behavioral1
Sample
5987995.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5987995.zip
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
Pal/Saved/SaveGames/0/4DB765FD4B7E500DF91375BA51CE6666/Players/7C12DF1E000000000000000000000000.sav
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
Pal/Saved/SaveGames/0/4DB765FD4B7E500DF91375BA51CE6666/Players/7C12DF1E000000000000000000000000.sav
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
Pal/Saved/SaveGames/0/4DB765FD4B7E500DF91375BA51CE6666/Players/B2F79672000000000000000000000000.sav
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Pal/Saved/SaveGames/0/4DB765FD4B7E500DF91375BA51CE6666/Players/B2F79672000000000000000000000000.sav
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
Pal/Saved/SaveGames/0/4DB765FD4B7E500DF91375BA51CE6666/Players/BA3E9DCF000000000000000000000000.sav
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Pal/Saved/SaveGames/0/4DB765FD4B7E500DF91375BA51CE6666/Players/BA3E9DCF000000000000000000000000.sav
Resource
win10v2004-20240221-en
Behavioral task
behavioral9
Sample
Pal/Saved/SaveGames/0/4DB765FD4B7E500DF91375BA51CE6666/Players/C58D2BA7000000000000000000000000.sav
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Pal/Saved/SaveGames/0/4DB765FD4B7E500DF91375BA51CE6666/Players/C58D2BA7000000000000000000000000.sav
Resource
win10v2004-20240221-en
Behavioral task
behavioral11
Sample
Pal/Saved/SaveGames/0/4DB765FD4B7E500DF91375BA51CE6666/Players/E76BA128000000000000000000000000.sav
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
Pal/Saved/SaveGames/0/4DB765FD4B7E500DF91375BA51CE6666/Players/E76BA128000000000000000000000000.sav
Resource
win10v2004-20240221-en
Behavioral task
behavioral13
Sample
Pal/Saved/SaveGames/0/4DB765FD4B7E500DF91375BA51CE6666/Players/F3341F22000000000000000000000000.sav
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Pal/Saved/SaveGames/0/4DB765FD4B7E500DF91375BA51CE6666/Players/F3341F22000000000000000000000000.sav
Resource
win10v2004-20240221-en
General
-
Target
Pal/Saved/SaveGames/0/4DB765FD4B7E500DF91375BA51CE6666/Players/C58D2BA7000000000000000000000000.sav
-
Size
3KB
-
MD5
93ae86cb85e9d009d0886831223f6047
-
SHA1
d646526912dd7edb820f74b6739341510a8c6b10
-
SHA256
8bcb33cd58113559ab12fca47eae56e741268ed82d201851456ac1e404e1bd0c
-
SHA512
88f46c00ecdf7cd572c6412f437a23f1b0f906975fb0c66b177b8868b15811b0fe5cc9375aed949a4505707c2e6f54eb27742baed06200cc12fdaf22de9be5e4
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.sav rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.sav\ = "sav_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\sav_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\sav_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\sav_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\sav_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\sav_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\sav_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 860 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 860 AcroRd32.exe 860 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2388 2564 cmd.exe 30 PID 2564 wrote to memory of 2388 2564 cmd.exe 30 PID 2564 wrote to memory of 2388 2564 cmd.exe 30 PID 2388 wrote to memory of 860 2388 rundll32.exe 32 PID 2388 wrote to memory of 860 2388 rundll32.exe 32 PID 2388 wrote to memory of 860 2388 rundll32.exe 32 PID 2388 wrote to memory of 860 2388 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Pal\Saved\SaveGames\0\4DB765FD4B7E500DF91375BA51CE6666\Players\C58D2BA7000000000000000000000000.sav1⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Pal\Saved\SaveGames\0\4DB765FD4B7E500DF91375BA51CE6666\Players\C58D2BA7000000000000000000000000.sav2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Pal\Saved\SaveGames\0\4DB765FD4B7E500DF91375BA51CE6666\Players\C58D2BA7000000000000000000000000.sav"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:860
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD511fdf49a2a74c7ec1e432179c3e31466
SHA110f70d4d0788333790983b69efefd75ab0dc11de
SHA256cc5ab54252e142064c68f6cea39ecb5db413156fda8db7800409c1aeb44cfaa4
SHA5124fa412653458d1fd614ca311b8020e7262d1f4c73a8d1f4b69e361ba551c3184913930b14eac52bed5365cc3f2d9df1c4923d479a2d8866884dedaf2ce19d34c