Overview
overview
8Static
static
8CollapseLo...in.ps1
windows7-x64
3CollapseLo...der.py
windows7-x64
3CollapseLo...ain.py
windows7-x64
3CollapseLo...API.py
windows7-x64
3CollapseLo...eat.py
windows7-x64
3CollapseLo...ner.py
windows7-x64
3CollapseLo...ats.py
windows7-x64
3CollapseLo...ata.py
windows7-x64
3CollapseLo...eat.py
windows7-x64
3CollapseLo...ker.py
windows7-x64
3CollapseLo...ger.py
windows7-x64
3CollapseLo...ogo.py
windows7-x64
3CollapseLo...ger.py
windows7-x64
3CollapseLo...RPC.py
windows7-x64
3CollapseLo...try.py
windows7-x64
3CollapseLo...tor.py
windows7-x64
3CollapseLo...ngs.py
windows7-x64
3CollapseLo...ter.py
windows7-x64
3CollapseLo...run.py
windows7-x64
3CollapseLo...cd.ps1
windows7-x64
3CollapseLo...cd.ps1
windows7-x64
3CollapseLo...px.exe
windows7-x64
7Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-06-2024 16:40
Behavioral task
behavioral1
Sample
CollapseLoader-1.2.5/.github/workflows/main.ps1
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
CollapseLoader-1.2.5/builder.py
Resource
win7-20240419-en
Behavioral task
behavioral3
Sample
CollapseLoader-1.2.5/collapse/main.py
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
CollapseLoader-1.2.5/collapse/utils/API.py
Resource
win7-20240215-en
Behavioral task
behavioral5
Sample
CollapseLoader-1.2.5/collapse/utils/Cheat.py
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
CollapseLoader-1.2.5/collapse/utils/CheatCleaner.py
Resource
win7-20240215-en
Behavioral task
behavioral7
Sample
CollapseLoader-1.2.5/collapse/utils/Cheats.py
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
CollapseLoader-1.2.5/collapse/utils/Data.py
Resource
win7-20240419-en
Behavioral task
behavioral9
Sample
CollapseLoader-1.2.5/collapse/utils/Fabric/FabricCheat.py
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
CollapseLoader-1.2.5/collapse/utils/LogChecker.py
Resource
win7-20240221-en
Behavioral task
behavioral11
Sample
CollapseLoader-1.2.5/collapse/utils/Logger.py
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
CollapseLoader-1.2.5/collapse/utils/Logo.py
Resource
win7-20240508-en
Behavioral task
behavioral13
Sample
CollapseLoader-1.2.5/collapse/utils/ModManager.py
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
CollapseLoader-1.2.5/collapse/utils/RPC.py
Resource
win7-20240220-en
Behavioral task
behavioral15
Sample
CollapseLoader-1.2.5/collapse/utils/Registry.py
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
CollapseLoader-1.2.5/collapse/utils/Selector.py
Resource
win7-20240221-en
Behavioral task
behavioral17
Sample
CollapseLoader-1.2.5/collapse/utils/Settings.py
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
CollapseLoader-1.2.5/collapse/utils/Updater.py
Resource
win7-20231129-en
Behavioral task
behavioral19
Sample
CollapseLoader-1.2.5/run.py
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
CollapseLoader-1.2.5/scripts/ci_cd.ps1
Resource
win7-20240508-en
Behavioral task
behavioral21
Sample
CollapseLoader-1.2.5/scripts/un_ci_cd.ps1
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
CollapseLoader-1.2.5/upx/upx.exe
Resource
win7-20240221-en
General
-
Target
CollapseLoader-1.2.5/collapse/main.py
-
Size
3KB
-
MD5
6b7365928616d70e3af5a9ec258a4def
-
SHA1
e83862e604a2aea91b3ba362449262689c33aa0e
-
SHA256
89d69026fc8ab62908615a50a51976d775f217cdb7cd9a4944ad9f6887dcaeb1
-
SHA512
af19f13f48ae24093f47709a17cf38252997eabf34ecdb39d8eab4ad0a0daae22abf70f6f6d77cca63b20fa1f94e11b4a4956f5898a26cc1121bb1005ea6b228
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\py_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.py rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\py_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2812 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2812 AcroRd32.exe 2812 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2524 2100 cmd.exe 29 PID 2100 wrote to memory of 2524 2100 cmd.exe 29 PID 2100 wrote to memory of 2524 2100 cmd.exe 29 PID 2524 wrote to memory of 2812 2524 rundll32.exe 30 PID 2524 wrote to memory of 2812 2524 rundll32.exe 30 PID 2524 wrote to memory of 2812 2524 rundll32.exe 30 PID 2524 wrote to memory of 2812 2524 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\CollapseLoader-1.2.5\collapse\main.py1⤵
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\CollapseLoader-1.2.5\collapse\main.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\CollapseLoader-1.2.5\collapse\main.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2812
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f5e99599e8e577588b73b7bcb329b510
SHA1790e423c9cf36ce9c216f6b4d1a804da6afe269f
SHA2569aa5e566377ed703960285f6d612a4447923ffcae6e1d4dd7958fb5fd6497161
SHA512d152d27bc2c9b873421606fdb2e0a85bfd2c413a22d5fe993e383b0f2dbdb35af532e7460bf7bbd2b63b9c78d0a416095bf05739ed1311bc9332dd7b95588582