Overview
overview
7Static
static
3autoexecute/test.txt
windows7-x64
1autoexecute/test.txt
windows10-2004-x64
1bin/api-docs.json
windows7-x64
3bin/api-docs.json
windows10-2004-x64
3bin/incogn...au.dll
windows7-x64
1bin/incogn...au.dll
windows10-2004-x64
1bin/save.json
windows7-x64
3bin/save.json
windows10-2004-x64
3main.exe
windows7-x64
7main.exe
windows10-2004-x64
7scripts/test.lua
windows7-x64
3scripts/test.lua
windows10-2004-x64
3workspace/...le.txt
windows7-x64
1workspace/...le.txt
windows10-2004-x64
1workspace/...et.txt
windows7-x64
1workspace/...et.txt
windows10-2004-x64
1workspace/...le.txt
windows7-x64
1workspace/...le.txt
windows10-2004-x64
1workspace/..._1.txt
windows7-x64
1workspace/..._1.txt
windows10-2004-x64
1workspace/..._2.txt
windows7-x64
1workspace/..._2.txt
windows10-2004-x64
1workspace/...le.txt
windows7-x64
1workspace/...le.txt
windows10-2004-x64
1workspace/...le.txt
windows7-x64
1workspace/...le.txt
windows10-2004-x64
1workspace/...tefile
windows7-x64
1workspace/...tefile
windows10-2004-x64
1workspace/...le.txt
windows7-x64
1workspace/...le.txt
windows10-2004-x64
1workspace/...est.js
windows7-x64
3workspace/...est.js
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 02:51
Static task
static1
Behavioral task
behavioral1
Sample
autoexecute/test.txt
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
autoexecute/test.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
bin/api-docs.json
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
bin/api-docs.json
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
bin/incognito-luau.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
bin/incognito-luau.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
bin/save.json
Resource
win7-20240419-en
Behavioral task
behavioral8
Sample
bin/save.json
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
main.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
main.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
scripts/test.lua
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
scripts/test.lua
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
workspace/.tests/appendfile.txt
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
workspace/.tests/appendfile.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
workspace/.tests/getcustomasset.txt
Resource
win7-20240215-en
Behavioral task
behavioral16
Sample
workspace/.tests/getcustomasset.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
workspace/.tests/isfile.txt
Resource
win7-20240419-en
Behavioral task
behavioral18
Sample
workspace/.tests/isfile.txt
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
workspace/.tests/listfiles/test_1.txt
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
workspace/.tests/listfiles/test_1.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
workspace/.tests/listfiles/test_2.txt
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
workspace/.tests/listfiles/test_2.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
workspace/.tests/loadfile.txt
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
workspace/.tests/loadfile.txt
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
workspace/.tests/readfile.txt
Resource
win7-20240220-en
Behavioral task
behavioral26
Sample
workspace/.tests/readfile.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
workspace/.tests/writefile
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
workspace/.tests/writefile
Resource
win10v2004-20240426-en
Behavioral task
behavioral29
Sample
workspace/.tests/writefile.txt
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
workspace/.tests/writefile.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
workspace/luarmor_compatibility_test.js
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
workspace/luarmor_compatibility_test.js
Resource
win10v2004-20240508-en
General
-
Target
bin/save.json
-
Size
46B
-
MD5
877b13372acbf8bf740694d141d1aeb0
-
SHA1
0c764bef8a7c94ef610c129720d3d3d9a66fea3f
-
SHA256
1bc3e6bcf3d47756fe6e456ce68165d39ea8358186d1a9bb4b2e5911389b22c1
-
SHA512
38a6a7e7bf9572daeabbafb7bb1868d09f9b487e84e17da263f627315623952ab203c8dc5e940b6d59d15183bdd43d153a08ae421f12d085480e73fcbc3b5b82
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\json_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\.json rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\json_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\json_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\json_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\json_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\.json\ = "json_auto_file" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\json_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2628 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2628 AcroRd32.exe 2628 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2944 wrote to memory of 2688 2944 cmd.exe rundll32.exe PID 2944 wrote to memory of 2688 2944 cmd.exe rundll32.exe PID 2944 wrote to memory of 2688 2944 cmd.exe rundll32.exe PID 2688 wrote to memory of 2628 2688 rundll32.exe AcroRd32.exe PID 2688 wrote to memory of 2628 2688 rundll32.exe AcroRd32.exe PID 2688 wrote to memory of 2628 2688 rundll32.exe AcroRd32.exe PID 2688 wrote to memory of 2628 2688 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\bin\save.json1⤵
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bin\save.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\bin\save.json"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2628
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD558f56b17ea81867fb8181e75fb8702fd
SHA15fa9947c9917fe3abc91e4924ca6886acf407efd
SHA256901efac22319527b56c09bce1839ab79b7e5988d5306c558c9592450255d0b00
SHA512c00c143ce28911404dfaf562b2160a3e64a9549312f3acec9569d545bca1d9ffce6420868ce2b9d8e9054f8fd9f4316dda6b4d2fefca96d572662c333b613ada