Analysis
-
max time kernel
359s -
max time network
360s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 15:11
Static task
static1
Behavioral task
behavioral1
Sample
S2 XP.zip
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
S2 XP/Data.rsdk
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
S2 XP/RSDKv4.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
S2 XP/SDL2.dll
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
S2 XP/glew32.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
S2 XP/ogg.dll
Resource
win7-20240508-en
Behavioral task
behavioral7
Sample
S2 XP/settings.ini
Resource
win7-20240419-en
Behavioral task
behavioral8
Sample
S2 XP/vorbis.dll
Resource
win7-20240221-en
General
-
Target
S2 XP/Data.rsdk
-
Size
44.3MB
-
MD5
a534b7ee8d5f359874d6698270be5a8b
-
SHA1
3f641a25eea2157a8e199570140d29073b0b7e9f
-
SHA256
3cb1fae4561f6f0bca478e42eb37c3b56fcc16263723389125626e58f945fbd5
-
SHA512
2564199ddae9b2597c30135355c13a38fe2bec951770c4ae8dd6c10f72e12a56c009bc6c32403e517fcd5fce0ab9f988df6788955f13974817b4ae1b50e63155
-
SSDEEP
786432:S/jdEvUOei5oeVngizx9pDqeWUDdPYce4Vde8DDpZ8nnYviZOIdLVN:MhEcpi5oedp+eHf/m8DDYn5ZOQLVN
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.rsdk\ = "rsdk_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\rsdk_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\rsdk_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\rsdk_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\rsdk_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\rsdk_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\rsdk_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.rsdk rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2720 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2720 AcroRd32.exe 2720 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2868 wrote to memory of 2660 2868 cmd.exe rundll32.exe PID 2868 wrote to memory of 2660 2868 cmd.exe rundll32.exe PID 2868 wrote to memory of 2660 2868 cmd.exe rundll32.exe PID 2660 wrote to memory of 2720 2660 rundll32.exe AcroRd32.exe PID 2660 wrote to memory of 2720 2660 rundll32.exe AcroRd32.exe PID 2660 wrote to memory of 2720 2660 rundll32.exe AcroRd32.exe PID 2660 wrote to memory of 2720 2660 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\S2 XP\Data.rsdk"1⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\S2 XP\Data.rsdk2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\S2 XP\Data.rsdk"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2720
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5176f4e6727e965dafce0c24626fe12a4
SHA1914288aa3f6a6472a04c58dad5688b2a7567492d
SHA256bef1b7b51504f95b72814998d26bee9e9c92d8c0cafd322288d0b326d3a6b4b7
SHA512c12d751ebf2b2f2015d21d994bdf58440524ec5dd5c2c063ac96eb01422f39f7df26207cc44a503f88fbff27390860b8dadd8ce22b5bced706df0879ce1b5f6f