Overview
overview
7Static
static
1Electron V3.rar
windows7-x64
3Electron V3.rar
windows10-2004-x64
3Electron V...V3.exe
windows7-x64
7Electron V...V3.exe
windows10-2004-x64
7loader-o.pyc
windows7-x64
3loader-o.pyc
windows10-2004-x64
3Electron V...ee.txt
windows7-x64
1Electron V...ee.txt
windows10-2004-x64
1Electron V...ld.txt
windows7-x64
1Electron V...ld.txt
windows10-2004-x64
1Electron V..._FE.iy
windows7-x64
3Electron V..._FE.iy
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14-07-2024 20:08
Static task
static1
Behavioral task
behavioral1
Sample
Electron V3.rar
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Electron V3.rar
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Electron V3/ElectronV3.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Electron V3/ElectronV3.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
loader-o.pyc
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
loader-o.pyc
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Electron V3/bin/agree.txt
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
Electron V3/bin/agree.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
Electron V3/scripts/Inf Yield.txt
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
Electron V3/scripts/Inf Yield.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
Electron V3/workspace/IY_FE.iy
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
Electron V3/workspace/IY_FE.iy
Resource
win10v2004-20240709-en
General
-
Target
Electron V3.rar
-
Size
37.0MB
-
MD5
ca43b33e3602b32d40503b05fde426e5
-
SHA1
7f6e18698426f87f317bec0b34824f73309613a7
-
SHA256
ed8d19c843f0c321d9ceb1201d78d9ded4f8685705706b620a250e3ea59adeb9
-
SHA512
35108b0921ac03defb467ca9e35948b8826ac323c6daeb5b82035bd916439f236703ffbff1c00ab14cfbbd020e6785b5f60c80ad8879ca18da8753177e8abdf9
-
SSDEEP
786432:k/wnn/givzGoxUj0qgICFcaYhZMYe8nxMBjixE7Itvbw9nmHznx/ksiZ+y:eGn//GZSYfxnNxby9mD+pMy
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2744 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2744 2864 cmd.exe 32 PID 2864 wrote to memory of 2744 2864 cmd.exe 32 PID 2864 wrote to memory of 2744 2864 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Electron V3.rar"1⤵
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Electron V3.rar2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2744
-