Overview
overview
10Static
static
1GalaxyFlip...ox.rar
windows7-x64
3GalaxyFlip...ox.rar
windows10-2004-x64
3BloxFlip.exe
windows7-x64
10BloxFlip.exe
windows10-2004-x64
10CustomWinApi.hpp
windows7-x64
3CustomWinApi.hpp
windows10-2004-x64
3D3DX9_43.dll
windows7-x64
1D3DX9_43.dll
windows10-2004-x64
1VMProtectSDK64.lib
windows7-x64
3VMProtectSDK64.lib
windows10-2004-x64
3auth.hpp
windows7-x64
3auth.hpp
windows10-2004-x64
3d3d_Hook.cpp
windows7-x64
3d3d_Hook.cpp
windows10-2004-x64
3imgui.ini
windows7-x64
1imgui.ini
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07-08-2024 11:03
Static task
static1
Behavioral task
behavioral1
Sample
GalaxyFlipv2.0Roblox.rar
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
GalaxyFlipv2.0Roblox.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
BloxFlip.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
BloxFlip.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
CustomWinApi.hpp
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
CustomWinApi.hpp
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
D3DX9_43.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
D3DX9_43.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
VMProtectSDK64.lib
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
VMProtectSDK64.lib
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
auth.hpp
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
auth.hpp
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
d3d_Hook.cpp
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
d3d_Hook.cpp
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
imgui.ini
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
imgui.ini
Resource
win10v2004-20240802-en
General
-
Target
VMProtectSDK64.lib
-
Size
7KB
-
MD5
f8fb5674b416f5f1a8bb4c94d60817c6
-
SHA1
56092d5cc15023eda121de5ff1aab47e32bc9a11
-
SHA256
c8c4c4d824b42ff38b05bd9f8f3781a63b9318baef087e4e9cf694ac4844a20d
-
SHA512
6e37daba16c47d89766665d0b1e7617878cd4e0e2abd0638e5ca3e9366740af0822a05c3fa62d0f60064a9bad4031f8b7e14d6ae5b4570f8326834ef5aa45920
-
SSDEEP
48:XrZ5/k5RLRzRCRXB6cI15A3Xy/F/CRcRj15T1tRLRyIBrJaFX43KXyAO4YMKUQl+:bjkqBw1xrR3KxKdKJ0DnBRU/rR
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AcroRd32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\lib_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\.lib\ = "lib_auto_file" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\lib_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\lib_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\lib_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\lib_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\.lib rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\lib_auto_file\shell\Read rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid Process 2828 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid Process 2828 AcroRd32.exe 2828 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid Process procid_target PID 2512 wrote to memory of 1856 2512 cmd.exe 32 PID 2512 wrote to memory of 1856 2512 cmd.exe 32 PID 2512 wrote to memory of 1856 2512 cmd.exe 32 PID 1856 wrote to memory of 2828 1856 rundll32.exe 33 PID 1856 wrote to memory of 2828 1856 rundll32.exe 33 PID 1856 wrote to memory of 2828 1856 rundll32.exe 33 PID 1856 wrote to memory of 2828 1856 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\VMProtectSDK64.lib1⤵
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\VMProtectSDK64.lib2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\VMProtectSDK64.lib"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2828
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD56e6fc59c089ebda8b1d041277b57d737
SHA147f565b302790a6ada8d2c15f5fed9474fc8fa74
SHA256be9e7d863cb022fd2e4300a791b1841a982e0fbcf30b7e603c7488395ac9ec19
SHA5123289c610740602fafa581c71e59908593daf7d561e7933d75728e01cd8794831f3990439d3bc0fc181fceb136e13da3c76f4e85103b6cdd2aebd190411b2182b