Overview
overview
4Static
static
3CurseForge...1).exe
windows7-x64
4CurseForge...1).exe
windows10-2004-x64
4$PLUGINSDI...xe.xml
windows7-x64
1$PLUGINSDI...xe.xml
windows10-2004-x64
1$PLUGINSDI...s.json
windows7-x64
3$PLUGINSDI...s.json
windows10-2004-x64
3$PLUGINSDI...p.html
windows7-x64
1$PLUGINSDI...p.html
windows10-2004-x64
1$PLUGINSDI...x.html
windows7-x64
1$PLUGINSDI...x.html
windows10-2004-x64
1$PLUGINSDI...app.js
windows7-x64
3$PLUGINSDI...app.js
windows10-2004-x64
3$PLUGINSDI...uts.js
windows7-x64
3$PLUGINSDI...uts.js
windows10-2004-x64
3$PLUGINSDI...dle.js
windows7-x64
3$PLUGINSDI...dle.js
windows10-2004-x64
3$PLUGINSDI...min.js
windows7-x64
3$PLUGINSDI...min.js
windows10-2004-x64
3$PLUGINSDI...ons.js
windows7-x64
3$PLUGINSDI...ons.js
windows10-2004-x64
3$PLUGINSDI...ics.js
windows7-x64
3$PLUGINSDI...ics.js
windows10-2004-x64
3$PLUGINSDI...nds.js
windows7-x64
3$PLUGINSDI...nds.js
windows10-2004-x64
3$PLUGINSDI...ies.js
windows7-x64
3$PLUGINSDI...ies.js
windows10-2004-x64
3$PLUGINSDI...ate.js
windows7-x64
3$PLUGINSDI...ate.js
windows10-2004-x64
3$PLUGINSDI...der.js
windows7-x64
3$PLUGINSDI...der.js
windows10-2004-x64
3$PLUGINSDI...ils.js
windows7-x64
3$PLUGINSDI...ils.js
windows10-2004-x64
3Analysis
-
max time kernel
72s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 21:03
Static task
static1
Behavioral task
behavioral1
Sample
CurseForge Windows - Installer (1).exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
CurseForge Windows - Installer (1).exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/OWInstaller.exe.xml
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/OWInstaller.exe.xml
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/app/_locales/de/messages.json
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/app/_locales/de/messages.json
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/app/cmp.html
Resource
win7-20240419-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/app/cmp.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/app/index.html
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/app/index.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/app/js/app.js
Resource
win7-20240611-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/app/js/app.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/app/js/block_inputs.js
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/app/js/block_inputs.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/app/js/libs/cmp.bundle.js
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/app/js/libs/cmp.bundle.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/app/js/libs/jquery-1.10.2.min.js
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/app/js/libs/jquery-1.10.2.min.js
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/app/js/models/notifications.js
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/app/js/models/notifications.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/app/js/utils/analytics.js
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/app/js/utils/analytics.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/app/js/utils/commands.js
Resource
win7-20240508-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/app/js/utils/commands.js
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/app/js/utils/cookies.js
Resource
win7-20240419-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/app/js/utils/cookies.js
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/app/js/utils/modal-events-delegate.js
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/app/js/utils/modal-events-delegate.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/app/js/utils/strings-loader.js
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/app/js/utils/strings-loader.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/app/js/utils/utils.js
Resource
win7-20240220-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/app/js/utils/utils.js
Resource
win10v2004-20240226-en
General
-
Target
$PLUGINSDIR/app/_locales/de/messages.json
-
Size
12KB
-
MD5
9ad7bb13a28acd7b7be3d35adf80de99
-
SHA1
0fabddcfd82faed51bb071fcfaa213db2583cb37
-
SHA256
4442ce287dfadf8d2019e4e975ee1c876d57d847c04715fd215ce03b24d36225
-
SHA512
9af9d5a66c4d9f39027eec20288bfac7170b43944fc58d6a05359624827a3847c4d90b232d3f1f621eaf3f5dd35172efcc96e763b1ca733dfedf02d4df084951
-
SSDEEP
192:RAJZco4VLBeZo9NhochYRl173tFUWIh239gdzu:bOSYd7V6a
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 848 OpenWith.exe -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 848 OpenWith.exe 848 OpenWith.exe 848 OpenWith.exe 848 OpenWith.exe 848 OpenWith.exe 848 OpenWith.exe 848 OpenWith.exe 848 OpenWith.exe 848 OpenWith.exe 848 OpenWith.exe 848 OpenWith.exe 848 OpenWith.exe 848 OpenWith.exe 848 OpenWith.exe 848 OpenWith.exe 848 OpenWith.exe 848 OpenWith.exe 848 OpenWith.exe 848 OpenWith.exe 848 OpenWith.exe 848 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 848 wrote to memory of 4040 848 OpenWith.exe 93 PID 848 wrote to memory of 4040 848 OpenWith.exe 93
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app\_locales\de\messages.json1⤵
- Modifies registry class
PID:3600
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app\_locales\de\messages.json2⤵PID:4040
-