Overview
overview
3Static
static
3xvll.zip
windows7-x64
1xvll.zip
windows10-2004-x64
1AutoMax v1...er.exe
windows7-x64
1AutoMax v1...er.exe
windows10-2004-x64
1AutoMax v1...xe.xml
windows7-x64
1AutoMax v1...xe.xml
windows10-2004-x64
1AutoMax v1...ccount
windows7-x64
1AutoMax v1...ccount
windows10-2004-x64
1AutoMax v1...ntName
windows7-x64
1AutoMax v1...ntName
windows10-2004-x64
1AutoMax v1...VN.exe
windows7-x64
1AutoMax v1...VN.exe
windows10-2004-x64
1AutoMax v1...ources
windows7-x64
1AutoMax v1...ources
windows10-2004-x64
1AutoMax v1..._extra
windows7-x64
1AutoMax v1..._extra
windows10-2004-x64
1AutoMax v1...s.json
windows7-x64
3AutoMax v1...s.json
windows10-2004-x64
3AutoMax v1...config
windows7-x64
3AutoMax v1...config
windows10-2004-x64
3AutoMax v1...assets
windows7-x64
3AutoMax v1...assets
windows10-2004-x64
3AutoMax v1...es.dat
windows7-x64
3AutoMax v1...es.dat
windows10-2004-x64
3AutoMax v1...tor.js
windows7-x64
1AutoMax v1...tor.js
windows10-2004-x64
1AutoMax v1...ne.xml
windows7-x64
1AutoMax v1...ne.xml
windows10-2004-x64
1AutoMax v1...gs.xml
windows7-x64
1AutoMax v1...gs.xml
windows10-2004-x64
1AutoMax v1...rowser
windows7-x64
3AutoMax v1...rowser
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/03/2024, 16:31
Static task
static1
Behavioral task
behavioral1
Sample
xvll.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
xvll.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
AutoMax v1.0.5 - Cracked by ElectroHeavenVN/AutoMaxManager.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
AutoMax v1.0.5 - Cracked by ElectroHeavenVN/AutoMaxManager.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
AutoMax v1.0.5 - Cracked by ElectroHeavenVN/AutoMaxManager.exe.xml
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
AutoMax v1.0.5 - Cracked by ElectroHeavenVN/AutoMaxManager.exe.xml
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
AutoMax v1.0.5 - Cracked by ElectroHeavenVN/Data/Account
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
AutoMax v1.0.5 - Cracked by ElectroHeavenVN/Data/Account
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
AutoMax v1.0.5 - Cracked by ElectroHeavenVN/Data/ClientName
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
AutoMax v1.0.5 - Cracked by ElectroHeavenVN/Data/ClientName
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
AutoMax v1.0.5 - Cracked by ElectroHeavenVN/Game/AutoMax_EHVN.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
AutoMax v1.0.5 - Cracked by ElectroHeavenVN/Game/AutoMax_EHVN.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
AutoMax v1.0.5 - Cracked by ElectroHeavenVN/Game/AutoMax_EHVN_Data/Resources/unity default resources
Resource
win7-20240215-en
Behavioral task
behavioral14
Sample
AutoMax v1.0.5 - Cracked by ElectroHeavenVN/Game/AutoMax_EHVN_Data/Resources/unity default resources
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
AutoMax v1.0.5 - Cracked by ElectroHeavenVN/Game/AutoMax_EHVN_Data/Resources/unity_builtin_extra
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
AutoMax v1.0.5 - Cracked by ElectroHeavenVN/Game/AutoMax_EHVN_Data/Resources/unity_builtin_extra
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
AutoMax v1.0.5 - Cracked by ElectroHeavenVN/Game/AutoMax_EHVN_Data/ScriptingAssemblies.json
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
AutoMax v1.0.5 - Cracked by ElectroHeavenVN/Game/AutoMax_EHVN_Data/ScriptingAssemblies.json
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
AutoMax v1.0.5 - Cracked by ElectroHeavenVN/Game/AutoMax_EHVN_Data/boot.config
Resource
win7-20240215-en
Behavioral task
behavioral20
Sample
AutoMax v1.0.5 - Cracked by ElectroHeavenVN/Game/AutoMax_EHVN_Data/boot.config
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
AutoMax v1.0.5 - Cracked by ElectroHeavenVN/Game/AutoMax_EHVN_Data/globalgamemanagers.assets
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
AutoMax v1.0.5 - Cracked by ElectroHeavenVN/Game/AutoMax_EHVN_Data/globalgamemanagers.assets
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
AutoMax v1.0.5 - Cracked by ElectroHeavenVN/Game/AutoMax_EHVN_Data/il2cpp_data/Resources/mscorlib.dll-resources.dat
Resource
win7-20240220-en
Behavioral task
behavioral24
Sample
AutoMax v1.0.5 - Cracked by ElectroHeavenVN/Game/AutoMax_EHVN_Data/il2cpp_data/Resources/mscorlib.dll-resources.dat
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
AutoMax v1.0.5 - Cracked by ElectroHeavenVN/Game/AutoMax_EHVN_Data/il2cpp_data/etc/mono/2.0/DefaultWsdlHelpGenerator.js
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
AutoMax v1.0.5 - Cracked by ElectroHeavenVN/Game/AutoMax_EHVN_Data/il2cpp_data/etc/mono/2.0/DefaultWsdlHelpGenerator.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
AutoMax v1.0.5 - Cracked by ElectroHeavenVN/Game/AutoMax_EHVN_Data/il2cpp_data/etc/mono/2.0/machine.xml
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
AutoMax v1.0.5 - Cracked by ElectroHeavenVN/Game/AutoMax_EHVN_Data/il2cpp_data/etc/mono/2.0/machine.xml
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
AutoMax v1.0.5 - Cracked by ElectroHeavenVN/Game/AutoMax_EHVN_Data/il2cpp_data/etc/mono/2.0/settings.xml
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
AutoMax v1.0.5 - Cracked by ElectroHeavenVN/Game/AutoMax_EHVN_Data/il2cpp_data/etc/mono/2.0/settings.xml
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
AutoMax v1.0.5 - Cracked by ElectroHeavenVN/Game/AutoMax_EHVN_Data/il2cpp_data/etc/mono/4.0/Browsers/Compat.browser
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
AutoMax v1.0.5 - Cracked by ElectroHeavenVN/Game/AutoMax_EHVN_Data/il2cpp_data/etc/mono/4.0/Browsers/Compat.browser
Resource
win10v2004-20231215-en
General
-
Target
AutoMax v1.0.5 - Cracked by ElectroHeavenVN/Game/AutoMax_EHVN_Data/globalgamemanagers.assets
-
Size
73KB
-
MD5
95a3b2a9fbc5b928a09a4343d705a2b0
-
SHA1
adacb9c7e74a9288f7426826a2cfeb20a87c288c
-
SHA256
f887d428315321521f830c511c22647e5e3ae846b62d17637033c79879886df6
-
SHA512
7b180748c56fe794425e334fe7df5e93f4df15fe119dec66c615a9b9750dc63581ed79c727be064ee110fd8836c8c2b187d65a2a67121cf151ade3a2cb47cd9e
-
SSDEEP
1536:k4mpVzKIjT+tRioYGQSRdIcGEoOgWsebgnjakCU:krVzKIjvSpgvCU
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\assets_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\assets_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\assets_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.assets rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.assets\ = "assets_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\assets_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\assets_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\assets_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2540 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2540 AcroRd32.exe 2540 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2848 2100 cmd.exe 29 PID 2100 wrote to memory of 2848 2100 cmd.exe 29 PID 2100 wrote to memory of 2848 2100 cmd.exe 29 PID 2848 wrote to memory of 2540 2848 rundll32.exe 30 PID 2848 wrote to memory of 2540 2848 rundll32.exe 30 PID 2848 wrote to memory of 2540 2848 rundll32.exe 30 PID 2848 wrote to memory of 2540 2848 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\AutoMax v1.0.5 - Cracked by ElectroHeavenVN\Game\AutoMax_EHVN_Data\globalgamemanagers.assets"1⤵
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\AutoMax v1.0.5 - Cracked by ElectroHeavenVN\Game\AutoMax_EHVN_Data\globalgamemanagers.assets2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\AutoMax v1.0.5 - Cracked by ElectroHeavenVN\Game\AutoMax_EHVN_Data\globalgamemanagers.assets"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2540
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD57e53e2b8539762d413311955ee4dde73
SHA17eaf917b476f341a7b51da97c2cf7a084fbe54dd
SHA2569b7f9d9cada61dd7f32a10969a6575dc4abb94530b98e2c5750ba096541e4c8d
SHA51279d2e55e4a6c93fee35a2ec5e427dcd736252a7809c01f6c574a6e3d0ae032c5dec6252832899cb8e8c24dbad8684780d1cf2baf2781244be08241238bceb9e9