Overview
overview
3Static
static
3amd-softwa...eb.exe
windows7-x64
3amd-softwa...eb.exe
windows10-2004-x64
3Bin64/AMDS...ud.ico
windows7-x64
3Bin64/AMDS...ud.ico
windows10-2004-x64
3Bin64/AMDS...er.ico
windows7-x64
3Bin64/AMDS...er.ico
windows10-2004-x64
3Bin64/Comb...er.ico
windows7-x64
3Bin64/Comb...er.ico
windows10-2004-x64
Bin64/amd_...ro.ico
windows7-x64
3Bin64/amd_...ro.ico
windows10-2004-x64
3Bin64/amdicdxx.dat
windows7-x64
3Bin64/amdicdxx.dat
windows10-2004-x64
3Bin64/cccm...4.json
windows7-x64
3Bin64/cccm...4.json
windows10-2004-x64
3Bin64/loca..._cs.qm
windows7-x64
3Bin64/loca..._cs.qm
windows10-2004-x64
3Bin64/loca..._DK.qm
windows7-x64
3Bin64/loca..._DK.qm
windows10-2004-x64
3Bin64/loca..._de.qm
windows7-x64
3Bin64/loca..._de.qm
windows10-2004-x64
3Bin64/loca..._GR.qm
windows7-x64
3Bin64/loca..._GR.qm
windows10-2004-x64
3Bin64/loca..._ES.qm
windows7-x64
3Bin64/loca..._ES.qm
windows10-2004-x64
3Bin64/loca..._FI.qm
windows7-x64
3Bin64/loca..._FI.qm
windows10-2004-x64
3Bin64/loca..._FR.qm
windows7-x64
3Bin64/loca..._FR.qm
windows10-2004-x64
3Bin64/loca..._HU.qm
windows7-x64
3Bin64/loca..._HU.qm
windows10-2004-x64
3Bin64/loca..._IT.qm
windows7-x64
3Bin64/loca..._IT.qm
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/03/2024, 11:27
Static task
static1
Behavioral task
behavioral1
Sample
amd-software-adrenalin-edition-24.3.1-minimalsetup-240320_web.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
amd-software-adrenalin-edition-24.3.1-minimalsetup-240320_web.exe
Resource
win10v2004-20240319-en
Behavioral task
behavioral3
Sample
Bin64/AMDSoftwareCloud.ico
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Bin64/AMDSoftwareCloud.ico
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Bin64/AMDSoftwareConsumer.ico
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
Bin64/AMDSoftwareConsumer.ico
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
Bin64/CombinedInstaller.ico
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Bin64/CombinedInstaller.ico
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
Bin64/amd_icon_pro.ico
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Bin64/amd_icon_pro.ico
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
Bin64/amdicdxx.dat
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
Bin64/amdicdxx.dat
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
Bin64/cccmanifest_64.json
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Bin64/cccmanifest_64.json
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
Bin64/localization/cs/INext_cs.qm
Resource
win7-20240319-en
Behavioral task
behavioral16
Sample
Bin64/localization/cs/INext_cs.qm
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
Bin64/localization/da_DK/INext_da_DK.qm
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Bin64/localization/da_DK/INext_da_DK.qm
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
Bin64/localization/de/INext_de.qm
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Bin64/localization/de/INext_de.qm
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
Bin64/localization/el_GR/INext_el_GR.qm
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
Bin64/localization/el_GR/INext_el_GR.qm
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
Bin64/localization/es_ES/INext_es_ES.qm
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
Bin64/localization/es_ES/INext_es_ES.qm
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
Bin64/localization/fi_FI/INext_fi_FI.qm
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
Bin64/localization/fi_FI/INext_fi_FI.qm
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
Bin64/localization/fr_FR/INext_fr_FR.qm
Resource
win7-20231129-en
Behavioral task
behavioral28
Sample
Bin64/localization/fr_FR/INext_fr_FR.qm
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
Bin64/localization/hu_HU/INext_hu_HU.qm
Resource
win7-20240319-en
Behavioral task
behavioral30
Sample
Bin64/localization/hu_HU/INext_hu_HU.qm
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
Bin64/localization/it_IT/INext_it_IT.qm
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
Bin64/localization/it_IT/INext_it_IT.qm
Resource
win10v2004-20240226-en
General
-
Target
Bin64/localization/da_DK/INext_da_DK.qm
-
Size
68KB
-
MD5
0acb8e22ee3746bad26d70263a441afc
-
SHA1
f74277682c0717c38704a83c4e30e951d14fec9f
-
SHA256
0ca5c2b67c9b006a33e6fb1918b9152c02b9cb0a0ede98a8c5e7cdbed628efae
-
SHA512
4eab44996fa590eb8c807a407482bf46600ee5762c0d640da35463bccda3c33f7d93207ec44ee4937c8e11da660eb7d19f15ef192ba1ea09e4a66995347cf0ae
-
SSDEEP
768:H2OSmIxvoOsbtZ8gh0h2InE/TLQ55INFrWNF1VaoT0thf4cmel:TSmIxvDhE/TLQT2FcFy4kl
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\qm_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\qm_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\qm_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.qm rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\qm_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\qm_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.qm\ = "qm_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\qm_auto_file\shell\Read rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2588 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2588 AcroRd32.exe 2588 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2000 2364 cmd.exe 29 PID 2364 wrote to memory of 2000 2364 cmd.exe 29 PID 2364 wrote to memory of 2000 2364 cmd.exe 29 PID 2000 wrote to memory of 2588 2000 rundll32.exe 30 PID 2000 wrote to memory of 2588 2000 rundll32.exe 30 PID 2000 wrote to memory of 2588 2000 rundll32.exe 30 PID 2000 wrote to memory of 2588 2000 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Bin64\localization\da_DK\INext_da_DK.qm1⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Bin64\localization\da_DK\INext_da_DK.qm2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Bin64\localization\da_DK\INext_da_DK.qm"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2588
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD534328486937ec510cb627fdefb7ed88b
SHA1dbc9e27aebd3eb74c8aa9105c364382535e10bf0
SHA25647c3d4fde4a0e34d4cb722df5d9deb7e87192d9e544d90b10b30821c85c0f222
SHA5121f12fe66614d1e6e6a2bf5c97e38de1ca3da2b3e462d5c332b5319c9d4b0269d8683d10cb3cf1a2378c5cf1ce5a218f56c7ce39d364f56381549debafc5f9712