Analysis
-
max time kernel
1557s -
max time network
1560s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/03/2024, 05:29
Static task
static1
Behavioral task
behavioral1
Sample
Counter-Strike-2-by-Igruha.torrent
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Counter-Strike-2-by-Igruha.torrent
Resource
win10v2004-20240226-en
General
-
Target
Counter-Strike-2-by-Igruha.torrent
-
Size
255KB
-
MD5
751aecc3b7da6fd92fc1550861be6974
-
SHA1
3d2c101f685ddffe257e78c1fe6b38208b920afd
-
SHA256
e0aa8eb6ed5c16afd0a5ff0a217737c09733c0abec2e9fdceb8018f6bfceffe3
-
SHA512
571bcb7f3d70c420c67ca4f9a15dd3a7e9ed1ba98c9cc312671bbe1d661512a9aa563591a93b9a28a973ce7456a54eeb6b98068891a893f92f2367007105bc25
-
SSDEEP
6144:VJNEp5k0U/qaeFV0dlmYlCJEs1hwCyITbSHAfNMj47ClhXFE:foT/aFdlRlnsrwtebSL47wLE
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\torrent_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\torrent_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\torrent_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\.torrent\ = "torrent_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\torrent_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\.torrent rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\torrent_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\torrent_auto_file\shell\Read\command rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2792 AcroRd32.exe 2792 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1564 wrote to memory of 2556 1564 cmd.exe 29 PID 1564 wrote to memory of 2556 1564 cmd.exe 29 PID 1564 wrote to memory of 2556 1564 cmd.exe 29 PID 2556 wrote to memory of 2792 2556 rundll32.exe 30 PID 2556 wrote to memory of 2792 2556 rundll32.exe 30 PID 2556 wrote to memory of 2792 2556 rundll32.exe 30 PID 2556 wrote to memory of 2792 2556 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Counter-Strike-2-by-Igruha.torrent1⤵
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Counter-Strike-2-by-Igruha.torrent2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Counter-Strike-2-by-Igruha.torrent"3⤵
- Suspicious use of SetWindowsHookEx
PID:2792
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD50b0a41486dcd4b14b178693e18ca1a85
SHA14f0d55bb9de0300511365f6ee64cc206a4bfbbb0
SHA256bb80bd55cc04ec17add49996baf5dc997a9d3355fed0a83af5d210f7f3a0fd06
SHA512a0457c2655851faa9b0331e6a4f1ffb1bad8bf02d98e87d95d54cc72059894a85fdcd52fddc18133f317416a4c7cc1d4dcf2df6bce892f5837cbc101d8a889ae