Overview
overview
10Static
static
3ResIL.dll
windows7-x64
1ResIL.dll
windows10-1703-x64
3ResIL.dll
windows10-2004-x64
1ResIL.dll
windows11-21h2-x64
3libGLESv2.dll
windows7-x64
3libGLESv2.dll
windows10-1703-x64
3libGLESv2.dll
windows10-2004-x64
3libGLESv2.dll
windows11-21h2-x64
3res_mods/1...zA.exe
windows7-x64
1res_mods/1...zA.exe
windows10-1703-x64
1res_mods/1...zA.exe
windows10-2004-x64
1res_mods/1...zA.exe
windows11-21h2-x64
1setup.exe
windows7-x64
10setup.exe
windows10-1703-x64
10setup.exe
windows10-2004-x64
10setup.exe
windows11-21h2-x64
10updates/Un...00.exe
windows7-x64
7updates/Un...00.exe
windows10-1703-x64
7updates/Un...00.exe
windows10-2004-x64
7updates/Un...00.exe
windows11-21h2-x64
7res/vehicl...sh.dds
windows7-x64
3res/vehicl...sh.dds
windows10-1703-x64
3res/vehicl...sh.dds
windows10-2004-x64
3res/vehicl...sh.dds
windows11-21h2-x64
3vivoxsdk.dll
windows7-x64
1vivoxsdk.dll
windows10-1703-x64
1vivoxsdk.dll
windows10-2004-x64
1vivoxsdk.dll
windows11-21h2-x64
1Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05/07/2024, 16:18
Static task
static1
Behavioral task
behavioral1
Sample
ResIL.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ResIL.dll
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
ResIL.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral4
Sample
ResIL.dll
Resource
win11-20240704-en
Behavioral task
behavioral5
Sample
libGLESv2.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
libGLESv2.dll
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
libGLESv2.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral8
Sample
libGLESv2.dll
Resource
win11-20240704-en
Behavioral task
behavioral9
Sample
res_mods/1.23.0.0/scripts/client/gui/mods/7zA.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
res_mods/1.23.0.0/scripts/client/gui/mods/7zA.exe
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
res_mods/1.23.0.0/scripts/client/gui/mods/7zA.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral12
Sample
res_mods/1.23.0.0/scripts/client/gui/mods/7zA.exe
Resource
win11-20240704-en
Behavioral task
behavioral13
Sample
setup.exe
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
setup.exe
Resource
win10-20240404-en
Behavioral task
behavioral15
Sample
setup.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral16
Sample
setup.exe
Resource
win11-20240704-en
Behavioral task
behavioral17
Sample
updates/Uninstall/unins000.exe
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
updates/Uninstall/unins000.exe
Resource
win10-20240404-en
Behavioral task
behavioral19
Sample
updates/Uninstall/unins000.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral20
Sample
updates/Uninstall/unins000.exe
Resource
win11-20240704-en
Behavioral task
behavioral21
Sample
res/vehicles/tank_crash.dds
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
res/vehicles/tank_crash.dds
Resource
win10-20240404-en
Behavioral task
behavioral23
Sample
res/vehicles/tank_crash.dds
Resource
win10v2004-20240508-en
Behavioral task
behavioral24
Sample
res/vehicles/tank_crash.dds
Resource
win11-20240704-en
Behavioral task
behavioral25
Sample
vivoxsdk.dll
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
vivoxsdk.dll
Resource
win10-20240404-en
Behavioral task
behavioral27
Sample
vivoxsdk.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral28
Sample
vivoxsdk.dll
Resource
win11-20240704-en
General
-
Target
res/vehicles/tank_crash.dds
-
Size
192B
-
MD5
4f4d7fe02a793313fb9966531f7076e0
-
SHA1
b352b14c3fc589541504c11257ccf14928c2f322
-
SHA256
c9d19ed823de4bafecb5b16f999239e9f59ed1c20e596da4108bfe74e51d864a
-
SHA512
3fb3bef437ffbf1f7bfe2776aadd214e4f17aaec82dc6b7ce6cb595cb0cbfb4d3ede13dd838f9786f23e9f8f14a62253bfb55a99efaef6e18733823790add248
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\dds_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.dds\ = "dds_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\dds_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.dds rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\dds_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\dds_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\dds_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\dds_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2724 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2724 AcroRd32.exe 2724 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1668 wrote to memory of 1696 1668 cmd.exe 31 PID 1668 wrote to memory of 1696 1668 cmd.exe 31 PID 1668 wrote to memory of 1696 1668 cmd.exe 31 PID 1696 wrote to memory of 2724 1696 rundll32.exe 32 PID 1696 wrote to memory of 2724 1696 rundll32.exe 32 PID 1696 wrote to memory of 2724 1696 rundll32.exe 32 PID 1696 wrote to memory of 2724 1696 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\res\vehicles\tank_crash.dds1⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\res\vehicles\tank_crash.dds2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\res\vehicles\tank_crash.dds"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2724
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a79473ab2d81e61ee5a1105a3b9aeb2e
SHA16911a0f9bd82dadcb959552efffee74c5ba725da
SHA25632181284d8df88c817cfb3b664ae33723d46ff35b8029315f7cd0ac513e2a586
SHA512417bdc76ede227a2b8f67e9a2aeb68623df3f5ed4496eebf6580f017b01cf3295190b3d472cf98ed01789c29729c97ecf1b0edf0337c2621f7b81af86f2ba07a