Overview
overview
7Static
static
3Pravelia.exe
windows7-x64
7Pravelia.exe
windows10-2004-x64
7$PLUGINSDIR/app-64.7z
windows7-x64
3$PLUGINSDIR/app-64.7z
windows10-2004-x64
3Installer.exe
windows7-x64
1Installer.exe
windows10-2004-x64
7locales/af.ps1
windows7-x64
3locales/af.ps1
windows10-2004-x64
3locales/uk.ps1
windows7-x64
3locales/uk.ps1
windows10-2004-x64
3resources/elevate.exe
windows7-x64
1resources/elevate.exe
windows10-2004-x64
1$R0/Uninst...er.exe
windows7-x64
3$R0/Uninst...er.exe
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 04:59
Static task
static1
Behavioral task
behavioral1
Sample
Pravelia.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Pravelia.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/app-64.7z
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/app-64.7z
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
Installer.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Installer.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
locales/af.ps1
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
locales/af.ps1
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
locales/uk.ps1
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
locales/uk.ps1
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
resources/elevate.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
resources/elevate.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
$R0/Uninstall Installer.exe
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
$R0/Uninstall Installer.exe
Resource
win10v2004-20240611-en
General
-
Target
$PLUGINSDIR/app-64.7z
-
Size
78.5MB
-
MD5
01f721d9b5ab6690f1fe6e6b0abe5c3d
-
SHA1
5964ef3b8967879debe8365ee2c84c32366c2261
-
SHA256
40992e7284e797ddb04aa0ab435f4ca64078f58adb082481d248db0e6d851d4e
-
SHA512
0b900db2755a4d7c3789fae7023b9cdb77877a6fa989e17b0a25e1b45754b7267065fcdf527fa5f2da0d7ff177fa3df6a72a779f09644f2214f30f65eb6c6708
-
SSDEEP
1572864:t6LBYdNKsmQYQHaZHBFdNYZvpXuyp3uOtWqwe:oufKsmQRHazFCHYAnv
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2516 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2516 AcroRd32.exe 2516 AcroRd32.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2620 2372 cmd.exe 29 PID 2372 wrote to memory of 2620 2372 cmd.exe 29 PID 2372 wrote to memory of 2620 2372 cmd.exe 29 PID 2620 wrote to memory of 2648 2620 rundll32.exe 30 PID 2620 wrote to memory of 2648 2620 rundll32.exe 30 PID 2620 wrote to memory of 2648 2620 rundll32.exe 30 PID 2648 wrote to memory of 2516 2648 rundll32.exe 32 PID 2648 wrote to memory of 2516 2648 rundll32.exe 32 PID 2648 wrote to memory of 2516 2648 rundll32.exe 32 PID 2648 wrote to memory of 2516 2648 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z1⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z"4⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2516
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5280ad1a607ad33274ff5f65c5d30474f
SHA1bbaabe861a604c35a22fc18003614902d9fbed6b
SHA256eb3ccd8a85cb427e858a0885b995335c45f8ee7256dc243fd84579f877044856
SHA512411fbe279206f353d21491f7bdfcdf1572f3ae81a2f55dab996f8df711c608c1567b5c8900d9baa935533336065fd8ab9edc2ec4385fc1b996fdab1f7bc692c6