Overview
overview
3Static
static
3BepInEx/co...ny.dll
windows7-x64
1BepInEx/co...20.dll
windows7-x64
1BepInEx/co...ny.dll
windows7-x64
1BepInEx/co...er.dll
windows7-x64
1BepInEx/co...Ex.dll
windows7-x64
1BepInEx/co...op.dll
windows7-x64
1BepInEx/co...db.dll
windows7-x64
1BepInEx/co...db.dll
windows7-x64
1BepInEx/co...ks.dll
windows7-x64
1BepInEx/co...il.dll
windows7-x64
1BepInEx/co...ur.dll
windows7-x64
1BepInEx/co...ls.dll
windows7-x64
1BepInEx/pa...on.dll
windows7-x64
1BepInEx/pa...er.dll
windows7-x64
1BepInEx/pa...er.dll
windows7-x64
1BepInEx/pa...ed.dll
windows7-x64
1BepInEx/pl...in.dll
windows7-x64
1BepInEx/pl...ee.dll
windows7-x64
1BepInEx/pl...in.dll
windows7-x64
1doorstop_l....dylib
windows7-x64
3doorstop_l...x64.so
windows7-x64
3doorstop_l....dylib
windows7-x64
3doorstop_l...x86.so
windows7-x64
3run_bepinex.sh
windows7-x64
3winhttp.dll
windows7-x64
1Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:18
Static task
static1
Behavioral task
behavioral1
Sample
BepInEx/core/0Harmony.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
BepInEx/core/0Harmony20.dll
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
BepInEx/core/BepInEx.Harmony.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
BepInEx/core/BepInEx.Preloader.dll
Resource
win7-20240508-en
Behavioral task
behavioral5
Sample
BepInEx/core/BepInEx.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
BepInEx/core/HarmonyXInterop.dll
Resource
win7-20240419-en
Behavioral task
behavioral7
Sample
BepInEx/core/Mono.Cecil.Mdb.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
BepInEx/core/Mono.Cecil.Pdb.dll
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
BepInEx/core/Mono.Cecil.Rocks.dll
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
BepInEx/core/Mono.Cecil.dll
Resource
win7-20240215-en
Behavioral task
behavioral11
Sample
BepInEx/core/MonoMod.RuntimeDetour.dll
Resource
win7-20240419-en
Behavioral task
behavioral12
Sample
BepInEx/core/MonoMod.Utils.dll
Resource
win7-20240508-en
Behavioral task
behavioral13
Sample
BepInEx/patchers/Tobey/ConfigHandler/Tobey.Subnautica.ConfigHandler.Configuration.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
BepInEx/patchers/Tobey/ConfigHandler/Tobey.Subnautica.ConfigHandler.Patcher.dll
Resource
win7-20240221-en
Behavioral task
behavioral15
Sample
BepInEx/patchers/Tobey/UnityAudio/Tobey.UnityAudio.Patcher.dll
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
BepInEx/patchers/Tobey/UnityAudio/Tobey.UnityAudio.Shared.dll
Resource
win7-20240508-en
Behavioral task
behavioral17
Sample
BepInEx/plugins/Tobey/ConfigHandler/Tobey.Subnautica.ConfigHandler.Plugin.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
BepInEx/plugins/Tobey/File Tree/Tobey.FileTree.dll
Resource
win7-20240508-en
Behavioral task
behavioral19
Sample
BepInEx/plugins/Tobey/UnityAudio/Tobey.UnityAudio.Plugin.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
doorstop_libs/libdoorstop_x64.dylib
Resource
win7-20240220-en
Behavioral task
behavioral21
Sample
doorstop_libs/libdoorstop_x64.so
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
doorstop_libs/libdoorstop_x86.dylib
Resource
win7-20240508-en
Behavioral task
behavioral23
Sample
doorstop_libs/libdoorstop_x86.so
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
run_bepinex.sh
Resource
win7-20240221-en
Behavioral task
behavioral25
Sample
winhttp.dll
Resource
win7-20231129-en
General
-
Target
doorstop_libs/libdoorstop_x64.dylib
-
Size
24KB
-
MD5
2d65bfc92198de87eba43f4b6f4b7f59
-
SHA1
c99a568f41bf86f55a7533c80d5a33a5a4dab523
-
SHA256
1867bfefe236bcf2c29d2a7e183a755c749861d27355e8bc4317a343e93ef15b
-
SHA512
92ac79d4dac74c5b15fcdb800c8fd90bf7971e725ad3d6c308d804f968365fe18dd813661d743523a8f65648a99196a82bd811cbae3521ae91470826ad68a5f3
-
SSDEEP
384:OjN7vZKC2t7nAhQcgtslDPOmp3PjvFNIpbNb:OjNb/MslqEjIpb
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\dylib_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.dylib rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\dylib_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.dylib\ = "dylib_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\dylib_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\dylib_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\dylib_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\dylib_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2348 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2348 AcroRd32.exe 2348 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2912 wrote to memory of 2616 2912 cmd.exe rundll32.exe PID 2912 wrote to memory of 2616 2912 cmd.exe rundll32.exe PID 2912 wrote to memory of 2616 2912 cmd.exe rundll32.exe PID 2616 wrote to memory of 2348 2616 rundll32.exe AcroRd32.exe PID 2616 wrote to memory of 2348 2616 rundll32.exe AcroRd32.exe PID 2616 wrote to memory of 2348 2616 rundll32.exe AcroRd32.exe PID 2616 wrote to memory of 2348 2616 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\doorstop_libs\libdoorstop_x64.dylib1⤵
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\doorstop_libs\libdoorstop_x64.dylib2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\doorstop_libs\libdoorstop_x64.dylib"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD582d6f00ae37154e4b8b2460daa117c1a
SHA148053794f09d7e0a4c5cf637e6fe7972ba6ca581
SHA256390b2815d387e50417d7e2b177b1c99ee85e8f1bb3c91b739c2ddad27cb95c48
SHA512ae31b89cab20b8450a47e7ad808f6b5f5abbb97c478e1e82dfc8e6d908abe58c030afd2d9a8ab1a1e352d0792ce32407f607ee515870d96e9c2835f1c05aac98