Overview
overview
10Static
static
3Quest Adve...er.zip
windows7-x64
1Quest Adve...er.zip
windows10-2004-x64
1Quest Adve...er.exe
windows7-x64
10Quest Adve...er.exe
windows10-2004-x64
10Quest Adve...ch.exe
windows7-x64
1Quest Adve...ch.exe
windows10-2004-x64
1Quest Adve...or.exe
windows7-x64
1Quest Adve...or.exe
windows10-2004-x64
1Quest Adve...er.exe
windows7-x64
1Quest Adve...er.exe
windows10-2004-x64
1Quest Adve...ar.exe
windows7-x64
1Quest Adve...ar.exe
windows10-2004-x64
1Quest Adve...er.exe
windows7-x64
1Quest Adve...er.exe
windows10-2004-x64
1Quest Adve...va.exe
windows7-x64
1Quest Adve...va.exe
windows10-2004-x64
1Quest Adve...ac.exe
windows7-x64
1Quest Adve...ac.exe
windows10-2004-x64
1Quest Adve...oc.exe
windows7-x64
1Quest Adve...oc.exe
windows10-2004-x64
1Quest Adve...md.exe
windows7-x64
1Quest Adve...md.exe
windows10-2004-x64
1Quest Adve...mplate
windows7-x64
3Quest Adve...mplate
windows10-2004-x64
3Quest Adve...erties
windows7-x64
3Quest Adve...erties
windows10-2004-x64
3Quest Adve...erties
windows7-x64
3Quest Adve...erties
windows10-2004-x64
3Quest Adve...curity
windows7-x64
3Quest Adve...curity
windows10-2004-x64
3Quest Adve...ME.txt
windows7-x64
1Quest Adve...ME.txt
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
13-05-2024 16:06
Static task
static1
Behavioral task
behavioral1
Sample
Quest Adventure Installer.zip
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Quest Adventure Installer.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Quest Adventure Installer/GameLauncher.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Quest Adventure Installer/GameLauncher.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Quest Adventure Installer/JRE/bin/jabswitch.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
Quest Adventure Installer/JRE/bin/jabswitch.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
Quest Adventure Installer/JRE/bin/jaccessinspector.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Quest Adventure Installer/JRE/bin/jaccessinspector.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
Quest Adventure Installer/JRE/bin/jaccesswalker.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Quest Adventure Installer/JRE/bin/jaccesswalker.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
Quest Adventure Installer/JRE/bin/jar.exe
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
Quest Adventure Installer/JRE/bin/jar.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
Quest Adventure Installer/JRE/bin/jarsigner.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Quest Adventure Installer/JRE/bin/jarsigner.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
Quest Adventure Installer/JRE/bin/java.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
Quest Adventure Installer/JRE/bin/java.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
Quest Adventure Installer/JRE/bin/javac.exe
Resource
win7-20240419-en
Behavioral task
behavioral18
Sample
Quest Adventure Installer/JRE/bin/javac.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
Quest Adventure Installer/JRE/bin/javadoc.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Quest Adventure Installer/JRE/bin/javadoc.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
Quest Adventure Installer/JRE/bin/jcmd.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
Quest Adventure Installer/JRE/bin/jcmd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
Quest Adventure Installer/JRE/conf/management/jmxremote.password.template
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
Quest Adventure Installer/JRE/conf/management/jmxremote.password.template
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
Quest Adventure Installer/JRE/conf/management/management.properties
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
Quest Adventure Installer/JRE/conf/management/management.properties
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
Quest Adventure Installer/JRE/conf/net.properties
Resource
win7-20240215-en
Behavioral task
behavioral28
Sample
Quest Adventure Installer/JRE/conf/net.properties
Resource
win10v2004-20240426-en
Behavioral task
behavioral29
Sample
Quest Adventure Installer/JRE/conf/security/java.security
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
Quest Adventure Installer/JRE/conf/security/java.security
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
Quest Adventure Installer/JRE/conf/security/policy/README.txt
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
Quest Adventure Installer/JRE/conf/security/policy/README.txt
Resource
win10v2004-20240426-en
General
-
Target
Quest Adventure Installer/JRE/conf/net.properties
-
Size
6KB
-
MD5
385443b7e4a37bc277c018cd1d336d49
-
SHA1
b2c0dfb00bf699e817bdd49b14bc24b8d3282c65
-
SHA256
5bc726671936e0af4fdf6bed67d9e3a20a92c30b0ba23673d0314baa5e3ffb08
-
SHA512
260afc7671a1dc0c443564f1d10386f0b241bb53c76df68d8d03f1d0b1ceaf3f68847ab3477732c876c2b01c812ef7521744befe88e312f3aa63164b608b67a1
-
SSDEEP
96:6ATE+VEtGObfObz3Ob6Onte3CO0V+r/aJ7SFXtqBZUT+gTzDuBnZkRnF:/LVGG4f4z346et5m27SnCgTe9GnF
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.properties rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\properties_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\properties_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\properties_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.properties\ = "properties_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\properties_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\properties_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\properties_auto_file rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid Process 2708 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid Process 2708 AcroRd32.exe 2708 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid Process procid_target PID 1920 wrote to memory of 2536 1920 cmd.exe 29 PID 1920 wrote to memory of 2536 1920 cmd.exe 29 PID 1920 wrote to memory of 2536 1920 cmd.exe 29 PID 2536 wrote to memory of 2708 2536 rundll32.exe 30 PID 2536 wrote to memory of 2708 2536 rundll32.exe 30 PID 2536 wrote to memory of 2708 2536 rundll32.exe 30 PID 2536 wrote to memory of 2708 2536 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Quest Adventure Installer\JRE\conf\net.properties"1⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Quest Adventure Installer\JRE\conf\net.properties2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Quest Adventure Installer\JRE\conf\net.properties"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2708
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5325c457062263188e5f32e55987643b6
SHA12f9b0ad5ee7bb649c077642991c7bba93e949d20
SHA2560507cf647cfaf80bb14b4e6afa99bd9fa84b4b14ec4827547655a7e24a4dff9d
SHA512c96208e1ade9d7ee91feac9563d87a1cf359a1ec87bad88faf9f87074bc525b83abc45b848edc7a979f110c078c1895c426ce31b909f39351c6dd038759a37aa