Overview
overview
7Static
static
3LUXONIX Pu....4.exe
windows7-x64
7LUXONIX Pu....4.exe
windows10-2004-x64
7$PLUGINSDI...al.ini
windows7-x64
1$PLUGINSDI...al.ini
windows10-2004-x64
1$PLUGINSDI...er.bmp
windows7-x64
3$PLUGINSDI...er.bmp
windows10-2004-x64
7$PLUGINSDI...rd.bmp
windows7-x64
3$PLUGINSDI...rd.bmp
windows10-2004-x64
7000 GM Normal.pth
windows7-x64
3000 GM Normal.pth
windows10-2004-x64
3000 GM Normal.smp
windows7-x64
3000 GM Normal.smp
windows10-2004-x64
3000 GM Normal.wvt
windows7-x64
3000 GM Normal.wvt
windows10-2004-x64
3001 GM Rhythm.pth
windows7-x64
3001 GM Rhythm.pth
windows10-2004-x64
3001 GM Rhythm.smp
windows7-x64
3001 GM Rhythm.smp
windows10-2004-x64
3001 GM Rhythm.wvt
windows7-x64
3001 GM Rhythm.wvt
windows10-2004-x64
3010 Factor...dy.smp
windows7-x64
3010 Factor...dy.smp
windows10-2004-x64
3010 Motive.pth
windows7-x64
3010 Motive.pth
windows10-2004-x64
3010 Piano.wvt
windows7-x64
3010 Piano.wvt
windows10-2004-x64
3011 Factory Drum.smp
windows7-x64
3011 Factory Drum.smp
windows10-2004-x64
3011 Organ.wvt
windows7-x64
3011 Organ.wvt
windows10-2004-x64
3012 Percussive.wvt
windows7-x64
3012 Percussive.wvt
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24-04-2024 21:03
Behavioral task
behavioral1
Sample
LUXONIX Purity VSTi.v1.2.4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
LUXONIX Purity VSTi.v1.2.4.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/modern-header.bmp
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/modern-header.bmp
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
000 GM Normal.pth
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
000 GM Normal.pth
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
000 GM Normal.smp
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
000 GM Normal.smp
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
000 GM Normal.wvt
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
000 GM Normal.wvt
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
001 GM Rhythm.pth
Resource
win7-20240215-en
Behavioral task
behavioral16
Sample
001 GM Rhythm.pth
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
001 GM Rhythm.smp
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
001 GM Rhythm.smp
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
001 GM Rhythm.wvt
Resource
win7-20240220-en
Behavioral task
behavioral20
Sample
001 GM Rhythm.wvt
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
010 Factory Melody.smp
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
010 Factory Melody.smp
Resource
win10v2004-20240412-en
Behavioral task
behavioral23
Sample
010 Motive.pth
Resource
win7-20240215-en
Behavioral task
behavioral24
Sample
010 Motive.pth
Resource
win10v2004-20240412-en
Behavioral task
behavioral25
Sample
010 Piano.wvt
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
010 Piano.wvt
Resource
win10v2004-20240412-en
Behavioral task
behavioral27
Sample
011 Factory Drum.smp
Resource
win7-20240220-en
Behavioral task
behavioral28
Sample
011 Factory Drum.smp
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
011 Organ.wvt
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
011 Organ.wvt
Resource
win10v2004-20240412-en
Behavioral task
behavioral31
Sample
012 Percussive.wvt
Resource
win7-20231129-en
Behavioral task
behavioral32
Sample
012 Percussive.wvt
Resource
win10v2004-20240412-en
General
-
Target
001 GM Rhythm.smp
-
Size
4.1MB
-
MD5
1d434d82660df481c21c50093d665caf
-
SHA1
3b90f64aa2125a11459244dfef1f544300c60bdc
-
SHA256
2e885b96c731751f13cfce91937b299111b0a589a797741023b80eba50791156
-
SHA512
26625d429390ba946fe1ae70296c601e0dd7e41b2333efce12541f54ed33813dfffe45df7ad62a7d4b36063a0fd18cf63a66dae2c67c37ca58263e5dfb614ea9
-
SSDEEP
98304:MNfY4cHWZNQxNhOVTNIFKt1eV2QvZ2HhV0FfrKCzshIycwmAEbfH+zH2:MN/c2PQMV+DQQhS70pKThIycwpEbP+72
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\smp_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\smp_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\smp_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\smp_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.smp rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.smp\ = "smp_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\smp_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\smp_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2800 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2800 AcroRd32.exe 2800 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2340 wrote to memory of 2112 2340 cmd.exe rundll32.exe PID 2340 wrote to memory of 2112 2340 cmd.exe rundll32.exe PID 2340 wrote to memory of 2112 2340 cmd.exe rundll32.exe PID 2112 wrote to memory of 2800 2112 rundll32.exe AcroRd32.exe PID 2112 wrote to memory of 2800 2112 rundll32.exe AcroRd32.exe PID 2112 wrote to memory of 2800 2112 rundll32.exe AcroRd32.exe PID 2112 wrote to memory of 2800 2112 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\001 GM Rhythm.smp"1⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\001 GM Rhythm.smp2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\001 GM Rhythm.smp"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEventsFilesize
3KB
MD50fa711700e418b34fd8f3e13a8dd971a
SHA1de046f18d5ddab16b0f534eab13c511417ce2c66
SHA256608bba25ebebc2a81e40118265817e1134e8cca291c5d145195c568842320810
SHA5120d8ffc552a4067d9f1f1e3ffcfe3f9948f403f142974e73c92c1baf95198a8baa018e07bf1d521c509255ebf7c954bff8d657b659033d6b01fe9d7767e11f9b2