Overview
overview
10Static
static
3Quest Adve...er.zip
windows7-x64
1Quest Adve...er.zip
windows10-2004-x64
1Quest Adve...er.exe
windows7-x64
10Quest Adve...er.exe
windows10-2004-x64
10Quest Adve...ch.exe
windows7-x64
1Quest Adve...ch.exe
windows10-2004-x64
1Quest Adve...or.exe
windows7-x64
1Quest Adve...or.exe
windows10-2004-x64
1Quest Adve...er.exe
windows7-x64
1Quest Adve...er.exe
windows10-2004-x64
1Quest Adve...ar.exe
windows7-x64
1Quest Adve...ar.exe
windows10-2004-x64
1Quest Adve...er.exe
windows7-x64
1Quest Adve...er.exe
windows10-2004-x64
1Quest Adve...va.exe
windows7-x64
1Quest Adve...va.exe
windows10-2004-x64
1Quest Adve...ac.exe
windows7-x64
1Quest Adve...ac.exe
windows10-2004-x64
1Quest Adve...oc.exe
windows7-x64
1Quest Adve...oc.exe
windows10-2004-x64
1Quest Adve...md.exe
windows7-x64
1Quest Adve...md.exe
windows10-2004-x64
1Quest Adve...mplate
windows7-x64
3Quest Adve...mplate
windows10-2004-x64
3Quest Adve...erties
windows7-x64
3Quest Adve...erties
windows10-2004-x64
3Quest Adve...erties
windows7-x64
3Quest Adve...erties
windows10-2004-x64
3Quest Adve...curity
windows7-x64
3Quest Adve...curity
windows10-2004-x64
3Quest Adve...ME.txt
windows7-x64
1Quest Adve...ME.txt
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
13-05-2024 16:06
Static task
static1
Behavioral task
behavioral1
Sample
Quest Adventure Installer.zip
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Quest Adventure Installer.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Quest Adventure Installer/GameLauncher.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Quest Adventure Installer/GameLauncher.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Quest Adventure Installer/JRE/bin/jabswitch.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
Quest Adventure Installer/JRE/bin/jabswitch.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
Quest Adventure Installer/JRE/bin/jaccessinspector.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Quest Adventure Installer/JRE/bin/jaccessinspector.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
Quest Adventure Installer/JRE/bin/jaccesswalker.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Quest Adventure Installer/JRE/bin/jaccesswalker.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
Quest Adventure Installer/JRE/bin/jar.exe
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
Quest Adventure Installer/JRE/bin/jar.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
Quest Adventure Installer/JRE/bin/jarsigner.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Quest Adventure Installer/JRE/bin/jarsigner.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
Quest Adventure Installer/JRE/bin/java.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
Quest Adventure Installer/JRE/bin/java.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
Quest Adventure Installer/JRE/bin/javac.exe
Resource
win7-20240419-en
Behavioral task
behavioral18
Sample
Quest Adventure Installer/JRE/bin/javac.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
Quest Adventure Installer/JRE/bin/javadoc.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Quest Adventure Installer/JRE/bin/javadoc.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
Quest Adventure Installer/JRE/bin/jcmd.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
Quest Adventure Installer/JRE/bin/jcmd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
Quest Adventure Installer/JRE/conf/management/jmxremote.password.template
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
Quest Adventure Installer/JRE/conf/management/jmxremote.password.template
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
Quest Adventure Installer/JRE/conf/management/management.properties
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
Quest Adventure Installer/JRE/conf/management/management.properties
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
Quest Adventure Installer/JRE/conf/net.properties
Resource
win7-20240215-en
Behavioral task
behavioral28
Sample
Quest Adventure Installer/JRE/conf/net.properties
Resource
win10v2004-20240426-en
Behavioral task
behavioral29
Sample
Quest Adventure Installer/JRE/conf/security/java.security
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
Quest Adventure Installer/JRE/conf/security/java.security
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
Quest Adventure Installer/JRE/conf/security/policy/README.txt
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
Quest Adventure Installer/JRE/conf/security/policy/README.txt
Resource
win10v2004-20240426-en
General
-
Target
Quest Adventure Installer/JRE/conf/security/java.security
-
Size
56KB
-
MD5
00cf40959861f61f17b90c6b6002a9a1
-
SHA1
982e48466428e1f49c1a5941c73afdacefd1d22e
-
SHA256
38166a975348862d693d95de8d676cf19cecccc45af4a1896c73c45f7bd966ef
-
SHA512
bad90152685279d896a4063d76dec5befe14831d3dd3260929b9a639505e898fa996b52aab3821a51c6c9aa09d956a23a8bdd870377a10e75c9399629cab5779
-
SSDEEP
768:rfBzVIMtipMfSSvAOUjt1p+SiIj4sjyaF/IJnoIqHihz3oFoBfCDqrsoZ9d5eDF:rIMy8SCAOUjt1p5/jCG/UoQhzYKpNnCF
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\security_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\security_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\security_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\security_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\security_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.security rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.security\ = "security_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\security_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2288 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2288 AcroRd32.exe 2288 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2700 1952 cmd.exe 29 PID 1952 wrote to memory of 2700 1952 cmd.exe 29 PID 1952 wrote to memory of 2700 1952 cmd.exe 29 PID 2700 wrote to memory of 2288 2700 rundll32.exe 30 PID 2700 wrote to memory of 2288 2700 rundll32.exe 30 PID 2700 wrote to memory of 2288 2700 rundll32.exe 30 PID 2700 wrote to memory of 2288 2700 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Quest Adventure Installer\JRE\conf\security\java.security"1⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Quest Adventure Installer\JRE\conf\security\java.security2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Quest Adventure Installer\JRE\conf\security\java.security"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2288
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD560e8ec666f55bc7d40062bd88d51574f
SHA156a557e3ff7ad854207b8d85ddcd6ef05a7a0d4b
SHA256212ba173cec578eaee4e74f7c88d96be2e60f3761b2887bb9135cf1f4791f7ea
SHA512c00fde89d3c0171648f8134df34d1dca9a85f7ca9b04aea655236587f19b27b3e5f3bd3663343a15327951747ae07f5ca4a26c5c3d82375409488e72a3761f8b