Overview
overview
5Static
static
3CapCut_726...er.exe
windows7-x64
4CapCut_726...er.exe
windows10-2004-x64
5$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ed.dll
windows7-x64
1$PLUGINSDI...ed.dll
windows10-2004-x64
1$PLUGINSDI...in.dll
windows7-x64
3$PLUGINSDI...in.dll
windows10-2004-x64
3$PLUGINSDIR/res.zip
windows7-x64
1$PLUGINSDIR/res.zip
windows10-2004-x64
1lang/ms-MY.json
windows7-x64
3lang/ms-MY.json
windows10-2004-x64
3lang/nl-NL.json
windows7-x64
3lang/nl-NL.json
windows10-2004-x64
3lang/pl-PL.json
windows7-x64
3lang/pl-PL.json
windows10-2004-x64
3lang/pt-BR.json
windows7-x64
3lang/pt-BR.json
windows10-2004-x64
3lang/ro-RO.json
windows7-x64
3lang/ro-RO.json
windows10-2004-x64
3lang/ru-RU.json
windows7-x64
3lang/ru-RU.json
windows10-2004-x64
3lang/sv-SE.json
windows7-x64
3lang/sv-SE.json
windows10-2004-x64
3lang/th-TH.json
windows7-x64
3lang/th-TH.json
windows10-2004-x64
3lang/tr-TR.json
windows7-x64
3lang/tr-TR.json
windows10-2004-x64
3lang/vi-VN.json
windows7-x64
3lang/vi-VN.json
windows10-2004-x64
3Analysis
-
max time kernel
1800s -
max time network
1818s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-04-2024 02:52
Static task
static1
Behavioral task
behavioral1
Sample
CapCut_7267140873131950085_installer.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
CapCut_7267140873131950085_installer.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/BgWorker.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/BgWorker.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/deviceregister_shared.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/deviceregister_shared.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/downloader_nsis_plugin.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/downloader_nsis_plugin.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/res.zip
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/res.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
lang/ms-MY.json
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
lang/ms-MY.json
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
lang/nl-NL.json
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
lang/nl-NL.json
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
lang/pl-PL.json
Resource
win7-20240319-en
Behavioral task
behavioral18
Sample
lang/pl-PL.json
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
lang/pt-BR.json
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
lang/pt-BR.json
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
lang/ro-RO.json
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
lang/ro-RO.json
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
lang/ru-RU.json
Resource
win7-20240215-en
Behavioral task
behavioral24
Sample
lang/ru-RU.json
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
lang/sv-SE.json
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
lang/sv-SE.json
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
lang/th-TH.json
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
lang/th-TH.json
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
lang/tr-TR.json
Resource
win7-20240215-en
Behavioral task
behavioral30
Sample
lang/tr-TR.json
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
lang/vi-VN.json
Resource
win7-20231129-en
Behavioral task
behavioral32
Sample
lang/vi-VN.json
Resource
win10v2004-20240226-en
General
-
Target
lang/pt-BR.json
-
Size
2KB
-
MD5
d2c8b30fbd813e99e644df20e1592491
-
SHA1
abfa50b8840a8672be8cce37966172c4631ba5be
-
SHA256
8813f8c06dd1b8faabc0b663e15beb2d75af30338e5171c5801a26d1ad8c1053
-
SHA512
50111ec5cb755635b4db6ad67e0c7bdd578aabaa5e70756a5beb39297b4e6675cc367347dc6d42a3874b4a692207a873c0ce5a8ed80a1390d3894d1b5719893d
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\json_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\json_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\json_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\json_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.json rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.json\ = "json_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\json_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\json_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 1528 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 1528 AcroRd32.exe 1528 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2524 wrote to memory of 2608 2524 cmd.exe rundll32.exe PID 2524 wrote to memory of 2608 2524 cmd.exe rundll32.exe PID 2524 wrote to memory of 2608 2524 cmd.exe rundll32.exe PID 2608 wrote to memory of 1528 2608 rundll32.exe AcroRd32.exe PID 2608 wrote to memory of 1528 2608 rundll32.exe AcroRd32.exe PID 2608 wrote to memory of 1528 2608 rundll32.exe AcroRd32.exe PID 2608 wrote to memory of 1528 2608 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\lang\pt-BR.json1⤵
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\lang\pt-BR.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\lang\pt-BR.json"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD50fb279d11a89c02ea800ffb413126be1
SHA14ac0d91f591b3565ee5f1d48b07b4651407aa958
SHA25681147058441aaed1dfacf61a2aac8e80a2b49896ee02b13c63a39592eb609bb3
SHA512ae9dbeb652d2e6b25d3cb22831dacb398fcc29c68c8af4e222283bab5db041ea4d95a07efac62b3beb1da27f0b3a3b678169d744b3eb2c18bb1007f5062be5a0