Overview
overview
8Static
static
8CollapseLo...in.ps1
windows7-x64
3CollapseLo...der.py
windows7-x64
3CollapseLo...ain.py
windows7-x64
3CollapseLo...API.py
windows7-x64
3CollapseLo...eat.py
windows7-x64
3CollapseLo...ner.py
windows7-x64
3CollapseLo...ats.py
windows7-x64
3CollapseLo...ata.py
windows7-x64
3CollapseLo...eat.py
windows7-x64
3CollapseLo...ker.py
windows7-x64
3CollapseLo...ger.py
windows7-x64
3CollapseLo...ogo.py
windows7-x64
3CollapseLo...ger.py
windows7-x64
3CollapseLo...RPC.py
windows7-x64
3CollapseLo...try.py
windows7-x64
3CollapseLo...tor.py
windows7-x64
3CollapseLo...ngs.py
windows7-x64
3CollapseLo...ter.py
windows7-x64
3CollapseLo...run.py
windows7-x64
3CollapseLo...cd.ps1
windows7-x64
3CollapseLo...cd.ps1
windows7-x64
3CollapseLo...px.exe
windows7-x64
7Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
06-06-2024 16:40
Behavioral task
behavioral1
Sample
CollapseLoader-1.2.5/.github/workflows/main.ps1
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
CollapseLoader-1.2.5/builder.py
Resource
win7-20240419-en
Behavioral task
behavioral3
Sample
CollapseLoader-1.2.5/collapse/main.py
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
CollapseLoader-1.2.5/collapse/utils/API.py
Resource
win7-20240215-en
Behavioral task
behavioral5
Sample
CollapseLoader-1.2.5/collapse/utils/Cheat.py
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
CollapseLoader-1.2.5/collapse/utils/CheatCleaner.py
Resource
win7-20240215-en
Behavioral task
behavioral7
Sample
CollapseLoader-1.2.5/collapse/utils/Cheats.py
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
CollapseLoader-1.2.5/collapse/utils/Data.py
Resource
win7-20240419-en
Behavioral task
behavioral9
Sample
CollapseLoader-1.2.5/collapse/utils/Fabric/FabricCheat.py
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
CollapseLoader-1.2.5/collapse/utils/LogChecker.py
Resource
win7-20240221-en
Behavioral task
behavioral11
Sample
CollapseLoader-1.2.5/collapse/utils/Logger.py
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
CollapseLoader-1.2.5/collapse/utils/Logo.py
Resource
win7-20240508-en
Behavioral task
behavioral13
Sample
CollapseLoader-1.2.5/collapse/utils/ModManager.py
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
CollapseLoader-1.2.5/collapse/utils/RPC.py
Resource
win7-20240220-en
Behavioral task
behavioral15
Sample
CollapseLoader-1.2.5/collapse/utils/Registry.py
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
CollapseLoader-1.2.5/collapse/utils/Selector.py
Resource
win7-20240221-en
Behavioral task
behavioral17
Sample
CollapseLoader-1.2.5/collapse/utils/Settings.py
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
CollapseLoader-1.2.5/collapse/utils/Updater.py
Resource
win7-20231129-en
Behavioral task
behavioral19
Sample
CollapseLoader-1.2.5/run.py
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
CollapseLoader-1.2.5/scripts/ci_cd.ps1
Resource
win7-20240508-en
Behavioral task
behavioral21
Sample
CollapseLoader-1.2.5/scripts/un_ci_cd.ps1
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
CollapseLoader-1.2.5/upx/upx.exe
Resource
win7-20240221-en
General
-
Target
CollapseLoader-1.2.5/run.py
-
Size
304B
-
MD5
776176d619812c1065e6253064f7642d
-
SHA1
7e804fddcd9dd48966c882814bd171f9243ee589
-
SHA256
4e7b13ace55dfc0cf7d22428b71eb4467b19e7e1dc337534a6cbe4b888161493
-
SHA512
6f63252a229f284125b3df284677d90150b615c24bbb6d1ed12fae741af2ee9c8b19a0936da80b83510a064b7dcdaa9648cc042c756a22249672ebf6e01e2e89
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\py_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\py_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\.py rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\py_auto_file\ rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2496 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2496 AcroRd32.exe 2496 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2512 1936 cmd.exe 29 PID 1936 wrote to memory of 2512 1936 cmd.exe 29 PID 1936 wrote to memory of 2512 1936 cmd.exe 29 PID 2512 wrote to memory of 2496 2512 rundll32.exe 30 PID 2512 wrote to memory of 2496 2512 rundll32.exe 30 PID 2512 wrote to memory of 2496 2512 rundll32.exe 30 PID 2512 wrote to memory of 2496 2512 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\CollapseLoader-1.2.5\run.py1⤵
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\CollapseLoader-1.2.5\run.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\CollapseLoader-1.2.5\run.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2496
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD550c4f07b7f54b9fccf51c621bb801371
SHA1ea3b7b636728eea8ad96cb0d5421f2bf1fdff897
SHA25659cbc8d23a96909769846a5049ec98b0a96e1ddf72c417f50d76ae6760596167
SHA51250d4e1cdb1d4475038f58bfb229ed904b3aee17af49113de4bffb105658622e3f9e4e3d00724c050ebc4f0e99397a94e8027b662cc191c2ff573e4c7d57215ab