Overview
overview
3Static
static
1Slot_Bot_Src_DreX.zip
windows7-x64
1Slot_Bot_Src_DreX.zip
windows10-2004-x64
1main (3).py
windows7-x64
3main (3).py
windows10-2004-x64
3mention_log (1).json
windows7-x64
3mention_log (1).json
windows10-2004-x64
3mention_log (1.json
windows7-x64
3mention_log (1.json
windows10-2004-x64
3slots (1).json
windows7-x64
3slots (1).json
windows10-2004-x64
3slots (1).txt
windows7-x64
1slots (1).txt
windows10-2004-x64
1vouches (1).json
windows7-x64
3vouches (1).json
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-04-2024 12:10
Static task
static1
Behavioral task
behavioral1
Sample
Slot_Bot_Src_DreX.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Slot_Bot_Src_DreX.zip
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
main (3).py
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
main (3).py
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
mention_log (1).json
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
mention_log (1).json
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
mention_log (1.json
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
mention_log (1.json
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
slots (1).json
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
slots (1).json
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
slots (1).txt
Resource
win7-20240319-en
Behavioral task
behavioral12
Sample
slots (1).txt
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
vouches (1).json
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
vouches (1).json
Resource
win10v2004-20240226-en
General
-
Target
slots (1).json
-
Size
98B
-
MD5
d5996cbd296604c6a08496ac70ced0b5
-
SHA1
909e4c62959628bd3c3ac3c1bfe25194877f229e
-
SHA256
1971ee758a1956a73c9bebf73ce9b0417b3d861fbe0e3ccb9ddf420e0824c931
-
SHA512
ca068719dafe233a68f505e34f9cfcb48f0b65b30fc4964125b1286fc7f1e238922aff610c546ec19afdc22e07bb30252fd49c97aebd0b6674ccd95c714dd78b
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\json_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\json_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\json_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\json_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.json rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.json\ = "json_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\json_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\json_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2644 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2644 AcroRd32.exe 2644 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2576 3044 cmd.exe 29 PID 3044 wrote to memory of 2576 3044 cmd.exe 29 PID 3044 wrote to memory of 2576 3044 cmd.exe 29 PID 2576 wrote to memory of 2644 2576 rundll32.exe 30 PID 2576 wrote to memory of 2644 2576 rundll32.exe 30 PID 2576 wrote to memory of 2644 2576 rundll32.exe 30 PID 2576 wrote to memory of 2644 2576 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\slots (1).json"1⤵
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\slots (1).json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\slots (1).json"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2644
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ba606b107248de922c1054d5fa0e180f
SHA152762b236741b7c7317d07a63a518edfe68f6499
SHA2564ba597d65a8e0dc2711d1a8c13e91ee4884d1cab3c709665445306f4289e05b4
SHA512ab32d1068e6d499929d2e8c0be1d704b17023eaebe67d185b648f17cb65430e97956eb226b14594a969c4c59d9a21ef666ab839f00c025a56db3ae733087480f