Overview
overview
7Static
static
1Inari.v1.2.1-Steam.7z
windows7-x64
7Inari.v1.2.1-Steam.7z
windows10-2004-x64
7Inari.v1.2...pi.dll
windows7-x64
1Inari.v1.2...pi.dll
windows10-2004-x64
1Inari.v1.2...p.info
windows7-x64
3Inari.v1.2...p.info
windows10-2004-x64
3Inari.v1.2...config
windows7-x64
3Inari.v1.2...config
windows10-2004-x64
3Inari.v1.2...nity3d
windows7-x64
3Inari.v1.2...nity3d
windows10-2004-x64
3Analysis
-
max time kernel
102s -
max time network
39s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/04/2024, 04:22
Static task
static1
Behavioral task
behavioral1
Sample
Inari.v1.2.1-Steam.7z
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Inari.v1.2.1-Steam.7z
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Inari.v1.2.1/Inari_Data/Plugins/x86/steam_api.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Inari.v1.2.1/Inari_Data/Plugins/x86/steam_api.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
Inari.v1.2.1/Inari_Data/app.info
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
Inari.v1.2.1/Inari_Data/app.info
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
Inari.v1.2.1/Inari_Data/boot.config
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
Inari.v1.2.1/Inari_Data/boot.config
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
Inari.v1.2.1/Inari_Data/data.unity3d
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Inari.v1.2.1/Inari_Data/data.unity3d
Resource
win10v2004-20240419-en
General
-
Target
Inari.v1.2.1/Inari_Data/data.unity3d
-
Size
873.9MB
-
MD5
1024d0568b467f1cf2b1d9f71d93db3f
-
SHA1
df7d205548a756b4a6e1fa88fef47c8091439773
-
SHA256
26d689e2b480151d5e48d66c4668d7d2dc73443ada0faae2c2b8b52d02b4e0d6
-
SHA512
adfba8a09e73990cdbb2bfe72301ee79bddadfb0f82aa2197435745be1cac6896ccdb765efb0abea8994863534ae8f6e8dfeef4bfd31f51561e05bc5c520c1b0
-
SSDEEP
25165824:im2yLc20tPVzuRUhprtyz8haVE/24ZARkiRv0x3uT1St:im2yLX0tPVzuRUhprtyzFVE/7ZARBRvK
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\unity3d_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\unity3d_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\unity3d_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.unity3d rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\unity3d_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\unity3d_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\unity3d_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.unity3d\ = "unity3d_auto_file" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2124 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2124 AcroRd32.exe 2124 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2664 2688 cmd.exe 29 PID 2688 wrote to memory of 2664 2688 cmd.exe 29 PID 2688 wrote to memory of 2664 2688 cmd.exe 29 PID 2664 wrote to memory of 2124 2664 rundll32.exe 30 PID 2664 wrote to memory of 2124 2664 rundll32.exe 30 PID 2664 wrote to memory of 2124 2664 rundll32.exe 30 PID 2664 wrote to memory of 2124 2664 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Inari.v1.2.1\Inari_Data\data.unity3d1⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Inari.v1.2.1\Inari_Data\data.unity3d2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Inari.v1.2.1\Inari_Data\data.unity3d"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2124
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5956685862f53be4152374dde9cf66524
SHA18a00b719bcf046081ce1fa402184e291ccce4f51
SHA256ba3dcaf3e4727401f8207471116ec880299d6b530f4c5cc9d2fd8a6725ef4625
SHA512acab30e27462c74a70a27dc1d14f1c34730d67a7ab99be11143b2a76cf182b8af423c043a45ca0facb7d368286e79fa511d85eb5bf40b8c2df25045c29361c26