Overview
overview
3Static
static
3oblivion-d...64.zip
windows7-x64
1oblivion-d...64.zip
windows10-2004-x64
1locales/af.pak
windows7-x64
3locales/af.pak
windows10-2004-x64
3locales/am.pak
windows7-x64
3locales/am.pak
windows10-2004-x64
3locales/ar.pak
windows7-x64
3locales/ar.pak
windows10-2004-x64
3locales/bg.pak
windows7-x64
3locales/bg.pak
windows10-2004-x64
3locales/bn.pak
windows7-x64
3locales/bn.pak
windows10-2004-x64
3locales/ca.pak
windows7-x64
3locales/ca.pak
windows10-2004-x64
1locales/cs.pak
windows7-x64
3locales/cs.pak
windows10-2004-x64
3locales/da.pak
windows7-x64
3locales/da.pak
windows10-2004-x64
3locales/de.pak
windows7-x64
3locales/de.pak
windows10-2004-x64
3locales/el.pak
windows7-x64
3locales/el.pak
windows10-2004-x64
3locales/en-GB.pak
windows7-x64
3locales/en-GB.pak
windows10-2004-x64
3locales/en-US.pak
windows7-x64
3locales/en-US.pak
windows10-2004-x64
3locales/es-419.pak
windows7-x64
3locales/es-419.pak
windows10-2004-x64
3locales/es.pak
windows7-x64
3locales/es.pak
windows10-2004-x64
3locales/et.pak
windows7-x64
3locales/et.pak
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/05/2024, 19:52
Static task
static1
Behavioral task
behavioral1
Sample
oblivion-desktop-win-x64.zip
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
oblivion-desktop-win-x64.zip
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
locales/af.pak
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
locales/af.pak
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
locales/am.pak
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
locales/am.pak
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
locales/ar.pak
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
locales/ar.pak
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
locales/bg.pak
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
locales/bg.pak
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
locales/bn.pak
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
locales/bn.pak
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
locales/ca.pak
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
locales/ca.pak
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
locales/cs.pak
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
locales/cs.pak
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
locales/da.pak
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
locales/da.pak
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
locales/de.pak
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
locales/de.pak
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
locales/el.pak
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
locales/el.pak
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
locales/en-GB.pak
Resource
win7-20240220-en
Behavioral task
behavioral24
Sample
locales/en-GB.pak
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
locales/en-US.pak
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
locales/en-US.pak
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
locales/es-419.pak
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
locales/es-419.pak
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
locales/es.pak
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
locales/es.pak
Resource
win10v2004-20240426-en
Behavioral task
behavioral31
Sample
locales/et.pak
Resource
win7-20240220-en
Behavioral task
behavioral32
Sample
locales/et.pak
Resource
win10v2004-20240426-en
General
-
Target
locales/da.pak
-
Size
446KB
-
MD5
5b033c206820ace5eb4c6f82aed34a5d
-
SHA1
28017cfc13259273022059f02564ffc99dcd75a4
-
SHA256
1a51de04cb205c708520f1b013447f1a89f0b1330dbce6d1e71cf355319d1108
-
SHA512
e423069f7a895179ea17be5774284e9e2e27f02c40bac7d7211cab77348800622796f04c3e6618905364e189ca5ec772ed7dbd285872777d163d3ebec08a64d4
-
SSDEEP
6144:CVNYzbxqzVBYO5c0orUrnwlH2oJwREbtEbvvXe5aNrRppd4gTGqfwQ:CV4bVLr2nQJ5SrJTpB
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\pak_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\pak_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\pak_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\pak_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.pak rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\pak_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.pak\ = "pak_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\pak_auto_file\shell\Read rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2616 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2616 AcroRd32.exe 2616 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2788 2156 cmd.exe 29 PID 2156 wrote to memory of 2788 2156 cmd.exe 29 PID 2156 wrote to memory of 2788 2156 cmd.exe 29 PID 2788 wrote to memory of 2616 2788 rundll32.exe 30 PID 2788 wrote to memory of 2616 2788 rundll32.exe 30 PID 2788 wrote to memory of 2616 2788 rundll32.exe 30 PID 2788 wrote to memory of 2616 2788 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\locales\da.pak1⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\locales\da.pak2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\locales\da.pak"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2616
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD518a75328fd5bc3a73bf0a67fca77d82a
SHA1b1cdd7fb7891bc1a91971b6335663baf36f97ad6
SHA2568bb556cbaac91c49d261691518b9a28c07983aa4f4d6b166581866bd3f4961a8
SHA512b7803336841b61fc098493ce0303aa13178e04de93f2c7f4b0c0813c2debbe935448f293177f890c7b93f9fc6bec55b6d4cff4c70be6b2c4a527c5787180615c