Overview
overview
10Static
static
3Quest Adve...er.zip
windows7-x64
1Quest Adve...er.zip
windows10-2004-x64
1Quest Adve...er.exe
windows7-x64
10Quest Adve...er.exe
windows10-2004-x64
10Quest Adve...ch.exe
windows7-x64
1Quest Adve...ch.exe
windows10-2004-x64
1Quest Adve...or.exe
windows7-x64
1Quest Adve...or.exe
windows10-2004-x64
1Quest Adve...er.exe
windows7-x64
1Quest Adve...er.exe
windows10-2004-x64
1Quest Adve...ar.exe
windows7-x64
1Quest Adve...ar.exe
windows10-2004-x64
1Quest Adve...er.exe
windows7-x64
1Quest Adve...er.exe
windows10-2004-x64
1Quest Adve...va.exe
windows7-x64
1Quest Adve...va.exe
windows10-2004-x64
1Quest Adve...ac.exe
windows7-x64
1Quest Adve...ac.exe
windows10-2004-x64
1Quest Adve...oc.exe
windows7-x64
1Quest Adve...oc.exe
windows10-2004-x64
1Quest Adve...md.exe
windows7-x64
1Quest Adve...md.exe
windows10-2004-x64
1Quest Adve...mplate
windows7-x64
3Quest Adve...mplate
windows10-2004-x64
3Quest Adve...erties
windows7-x64
3Quest Adve...erties
windows10-2004-x64
3Quest Adve...erties
windows7-x64
3Quest Adve...erties
windows10-2004-x64
3Quest Adve...curity
windows7-x64
3Quest Adve...curity
windows10-2004-x64
3Quest Adve...ME.txt
windows7-x64
1Quest Adve...ME.txt
windows10-2004-x64
1Analysis
-
max time kernel
117s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-05-2024 16:06
Static task
static1
Behavioral task
behavioral1
Sample
Quest Adventure Installer.zip
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Quest Adventure Installer.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Quest Adventure Installer/GameLauncher.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Quest Adventure Installer/GameLauncher.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Quest Adventure Installer/JRE/bin/jabswitch.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
Quest Adventure Installer/JRE/bin/jabswitch.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
Quest Adventure Installer/JRE/bin/jaccessinspector.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Quest Adventure Installer/JRE/bin/jaccessinspector.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
Quest Adventure Installer/JRE/bin/jaccesswalker.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Quest Adventure Installer/JRE/bin/jaccesswalker.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
Quest Adventure Installer/JRE/bin/jar.exe
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
Quest Adventure Installer/JRE/bin/jar.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
Quest Adventure Installer/JRE/bin/jarsigner.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Quest Adventure Installer/JRE/bin/jarsigner.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
Quest Adventure Installer/JRE/bin/java.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
Quest Adventure Installer/JRE/bin/java.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
Quest Adventure Installer/JRE/bin/javac.exe
Resource
win7-20240419-en
Behavioral task
behavioral18
Sample
Quest Adventure Installer/JRE/bin/javac.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
Quest Adventure Installer/JRE/bin/javadoc.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Quest Adventure Installer/JRE/bin/javadoc.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
Quest Adventure Installer/JRE/bin/jcmd.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
Quest Adventure Installer/JRE/bin/jcmd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
Quest Adventure Installer/JRE/conf/management/jmxremote.password.template
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
Quest Adventure Installer/JRE/conf/management/jmxremote.password.template
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
Quest Adventure Installer/JRE/conf/management/management.properties
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
Quest Adventure Installer/JRE/conf/management/management.properties
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
Quest Adventure Installer/JRE/conf/net.properties
Resource
win7-20240215-en
Behavioral task
behavioral28
Sample
Quest Adventure Installer/JRE/conf/net.properties
Resource
win10v2004-20240426-en
Behavioral task
behavioral29
Sample
Quest Adventure Installer/JRE/conf/security/java.security
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
Quest Adventure Installer/JRE/conf/security/java.security
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
Quest Adventure Installer/JRE/conf/security/policy/README.txt
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
Quest Adventure Installer/JRE/conf/security/policy/README.txt
Resource
win10v2004-20240426-en
General
-
Target
Quest Adventure Installer/JRE/conf/management/jmxremote.password.template
-
Size
5KB
-
MD5
ad773cfd53efe03e662f1cf23561f725
-
SHA1
3bad5b040b6d7117df4c40609ea0f8074339ee47
-
SHA256
0273b6a6b9e20e6ce54c5aee70164028e0395063b2b7d39060a40b6495543dbf
-
SHA512
e6794168ba80a8ff733d8c1771930ae8c8fc33030e5e9ca02700f326c88a2f68ff09bc734bfd1e492ef15705b288c7918ce1f3f7174742dee6a62dfe086abd65
-
SSDEEP
96:MdJb7RT9iQj/y3LNNWoT2Wjb3LpjtzIVSnQDeJuV9uiS2T4Z:059ipz1nlZzIVSnQDeJqpSSO
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\template_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\template_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\template_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\template_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.template rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.template\ = "template_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\template_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\template_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2544 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2544 AcroRd32.exe 2544 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2784 2912 cmd.exe 31 PID 2912 wrote to memory of 2784 2912 cmd.exe 31 PID 2912 wrote to memory of 2784 2912 cmd.exe 31 PID 2784 wrote to memory of 2544 2784 rundll32.exe 32 PID 2784 wrote to memory of 2544 2784 rundll32.exe 32 PID 2784 wrote to memory of 2544 2784 rundll32.exe 32 PID 2784 wrote to memory of 2544 2784 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Quest Adventure Installer\JRE\conf\management\jmxremote.password.template"1⤵
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Quest Adventure Installer\JRE\conf\management\jmxremote.password.template2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Quest Adventure Installer\JRE\conf\management\jmxremote.password.template"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2544
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58aad30e7d60b05bd3d5023d6b04961ce
SHA1bf8d86eb52fc71224b498fa8b22938b936e68211
SHA256713beb150b66d88776a366bb9fe9cd2fade5bfac12eb39ff6a861bc2ee0b2c22
SHA512a4856ad8b1729625f186932a1e5fc156d221440946f1f862eb520f489303497a0b276c348bdef4afda3932e731cfb48004f58af8abece24c96c6dccb50f259f8