Overview
overview
6Static
static
1TARISMiniL...tl.exe
windows7-x64
6TARISMiniL...tl.exe
windows10-2004-x64
6LogConfig.ini
windows7-x64
1LogConfig.ini
windows10-2004-x64
1Minidown.xml
windows7-x64
3Minidown.xml
windows10-2004-x64
1TARISMiniloader.exe
windows7-x64
6TARISMiniloader.exe
windows10-2004-x64
6bugreport.ini
windows7-x64
1bugreport.ini
windows10-2004-x64
1error_code.json
windows7-x64
3error_code.json
windows10-2004-x64
3icon.ico
windows7-x64
3icon.ico
windows10-2004-x64
3install_script.dat
windows7-x64
3install_script.dat
windows10-2004-x64
3res.zip
windows7-x64
1res.zip
windows10-2004-x64
1[email protected]
windows7-x64
3[email protected]
windows10-2004-x64
3browse_pressed.png
windows7-x64
3browse_pressed.png
windows10-2004-x64
3[email protected]
windows7-x64
3[email protected]
windows10-2004-x64
3browse_t_disabled.png
windows7-x64
3browse_t_disabled.png
windows10-2004-x64
3[email protected]
windows7-x64
3[email protected]
windows10-2004-x64
3browse_t_hover.png
windows7-x64
3browse_t_hover.png
windows10-2004-x64
3[email protected]
windows7-x64
3[email protected]
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06-08-2024 21:10
Static task
static1
Behavioral task
behavioral1
Sample
TARISMiniLoader_official.wg.intl.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
TARISMiniLoader_official.wg.intl.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
LogConfig.ini
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
LogConfig.ini
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Minidown.xml
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Minidown.xml
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
TARISMiniloader.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
TARISMiniloader.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
bugreport.ini
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
bugreport.ini
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
error_code.json
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
error_code.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
icon.ico
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
icon.ico
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
install_script.dat
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
install_script.dat
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
res.zip
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
res.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
browse_pressed.png
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
browse_pressed.png
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
browse_t_disabled.png
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
browse_t_disabled.png
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
browse_t_hover.png
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
browse_t_hover.png
Resource
win10v2004-20240802-en
General
-
Target
error_code.json
-
Size
346KB
-
MD5
3e69d25e4de00840b4ef97f890d1687f
-
SHA1
2b24116474e432bc5aba9789a4b22e6dd8511561
-
SHA256
ba2d92cc27b62969fc7e016bfe5535b03a45c9f32c78efb2e1018d590ae6bc60
-
SHA512
cf1d0935c68bd42747d8434a0ceea00c6f1eb10b70698673b3a6637331208e7e139451c506a18bf64d6b7c94ad72b27ca88992e81f44c8358636d1771969fbf6
-
SSDEEP
6144:900nuL5Spvu14yxwkXtSGQBocvKTgCvOpwMGHa7EN28:900nuL5SpvFrBf2
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\.json rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\json_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\json_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\json_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\json_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\json_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\.json\ = "json_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\json_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2720 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2720 AcroRd32.exe 2720 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2216 2416 cmd.exe 31 PID 2416 wrote to memory of 2216 2416 cmd.exe 31 PID 2416 wrote to memory of 2216 2416 cmd.exe 31 PID 2216 wrote to memory of 2720 2216 rundll32.exe 33 PID 2216 wrote to memory of 2720 2216 rundll32.exe 33 PID 2216 wrote to memory of 2720 2216 rundll32.exe 33 PID 2216 wrote to memory of 2720 2216 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\error_code.json1⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\error_code.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\error_code.json"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2720
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58d6a4acae40a5853d5a8772bd2283f3e
SHA1aab6875648d40a93b988d6e0053487dd64b357d0
SHA2561af54fe13c18b7609b1f4b909953358811a33b57831053c66e1736ec85ef8002
SHA5120570c4f787aa42fa8d4ee517f49f1e350cdcc2f2dff3676c7f44e7246a58b705c690db04a2280b46c4a120b3908ef20f473d9d59ee5894fcb73dad2d20a589de