Overview
overview
10Static
static
3archive_3hc.rar
windows7-x64
3archive_3hc.rar
windows10-2004-x64
3Licenses.txt
windows7-x64
1Licenses.txt
windows10-2004-x64
1amdhip64.dll
windows7-x64
1amdhip64.dll
windows10-2004-x64
1concrt140.dll
windows7-x64
1concrt140.dll
windows10-2004-x64
1msvcp140.dll
windows7-x64
1msvcp140.dll
windows10-2004-x64
7setup.exe
windows7-x64
10setup.exe
windows10-2004-x64
10updates/icudtl.dat
windows7-x64
3updates/icudtl.dat
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2024 13:07
Static task
static1
Behavioral task
behavioral1
Sample
archive_3hc.rar
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
archive_3hc.rar
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Licenses.txt
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
Licenses.txt
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
amdhip64.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
amdhip64.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
concrt140.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
concrt140.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
msvcp140.dll
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
msvcp140.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
setup.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
setup.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
updates/icudtl.dat
Resource
win7-20240611-en
Behavioral task
behavioral14
Sample
updates/icudtl.dat
Resource
win10v2004-20240508-en
General
-
Target
archive_3hc.rar
-
Size
8.8MB
-
MD5
b659e40fa008a288ddd3cde323ba6301
-
SHA1
78e3c3cd6f4603d3eba7e74ddfb9a10d2d059532
-
SHA256
b7642a6b4604a036661c77e129d89794023dcab97b3f77a73dbad356fe61d9ad
-
SHA512
be1d98d09b185c20f4515823c64f4729d14d92b8d58b09f3bc554d191332e6d385bf2d09dd92148e5bd5ffcb3d680850d5b4b36103e8363fc0c299c3f2cdfedb
-
SSDEEP
196608:EbjGZMBzUluuJFaD5KiKXKh1lX+WgCZdewHaETSP3m4FrKz:EPXBzUcMhlah1JldUwH3TSP3rFra
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2192 OpenWith.exe -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 2192 OpenWith.exe 2192 OpenWith.exe 2192 OpenWith.exe 2192 OpenWith.exe 2192 OpenWith.exe 2192 OpenWith.exe 2192 OpenWith.exe 2192 OpenWith.exe 2192 OpenWith.exe 2192 OpenWith.exe 2192 OpenWith.exe 2192 OpenWith.exe 2192 OpenWith.exe 2192 OpenWith.exe 2192 OpenWith.exe 2884 AcroRd32.exe 2884 AcroRd32.exe 2884 AcroRd32.exe 2884 AcroRd32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2884 2192 OpenWith.exe 104 PID 2192 wrote to memory of 2884 2192 OpenWith.exe 104 PID 2192 wrote to memory of 2884 2192 OpenWith.exe 104
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\archive_3hc.rar1⤵
- Modifies registry class
PID:2052
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\archive_3hc.rar"2⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=2860,i,2607710392823067546,4648797561512801463,262144 --variations-seed-version --mojo-platform-channel-handle=4280 /prefetch:81⤵PID:3712