Overview
overview
10Static
static
10mw3 cheat.rar
windows7-x64
3mw3 cheat.rar
windows10-2004-x64
3mw3/Databa...te.dbd
windows7-x64
3mw3/Databa...te.dbd
windows10-2004-x64
3mw3/Database/FB.dbd
windows7-x64
3mw3/Database/FB.dbd
windows10-2004-x64
3mw3/Databa...xt.dbd
windows7-x64
3mw3/Databa...xt.dbd
windows10-2004-x64
3mw3/Databa...DB.dbd
windows7-x64
3mw3/Databa...DB.dbd
windows10-2004-x64
3mw3/Databa...mp.dbd
windows7-x64
3mw3/Databa...mp.dbd
windows10-2004-x64
3mw3/Databa...ta.dbd
windows7-x64
3mw3/Databa...ta.dbd
windows10-2004-x64
3mw3/Databa...th.dbd
windows7-x64
3mw3/Databa...th.dbd
windows10-2004-x64
3mw3/Databa...PM.dbd
windows7-x64
3mw3/Databa...PM.dbd
windows10-2004-x64
3mw3/Databa...te.dbd
windows7-x64
3mw3/Databa...te.dbd
windows10-2004-x64
3mw3/Databa...fo.dbd
windows7-x64
3mw3/Databa...fo.dbd
windows10-2004-x64
3mw3/Databa...te.dbd
windows7-x64
3mw3/Databa...te.dbd
windows10-2004-x64
3mw3/Databa...db.dbd
windows7-x64
3mw3/Databa...db.dbd
windows10-2004-x64
3mw3/Databa...ft.dbd
windows7-x64
3mw3/Databa...ft.dbd
windows10-2004-x64
3mw3/Debug/...on.dll
windows7-x64
1mw3/Debug/...on.dll
windows10-2004-x64
1mw3/Debug/...er.ini
windows7-x64
1mw3/Debug/...er.ini
windows10-2004-x64
1Resubmissions
10-08-2024 11:37
240810-nre4raxekr 10Analysis
-
max time kernel
102s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10-08-2024 11:37
Behavioral task
behavioral1
Sample
mw3 cheat.rar
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
mw3 cheat.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
mw3/Database/AppRate.dbd
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
mw3/Database/AppRate.dbd
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
mw3/Database/FB.dbd
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
mw3/Database/FB.dbd
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
mw3/Database/PSExt.dbd
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
mw3/Database/PSExt.dbd
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
mw3/Database/PlugDB.dbd
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
mw3/Database/PlugDB.dbd
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
mw3/Database/PriTemp.dbd
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
mw3/Database/PriTemp.dbd
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
mw3/Database/SBData.dbd
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
mw3/Database/SBData.dbd
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
mw3/Database/SoftHealth.dbd
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
mw3/Database/SoftHealth.dbd
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
mw3/Database/SoftPM.dbd
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
mw3/Database/SoftPM.dbd
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
mw3/Database/UninstallRote.dbd
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
mw3/Database/UninstallRote.dbd
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
mw3/Database/sMarUpdateInfo.dbd
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
mw3/Database/sMarUpdateInfo.dbd
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
mw3/Database/sUpdate.dbd
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
mw3/Database/sUpdate.dbd
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
mw3/Database/uninstall_qdb.dbd
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
mw3/Database/uninstall_qdb.dbd
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
mw3/Database/usoft.dbd
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
mw3/Database/usoft.dbd
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
mw3/Debug/Addition.dll
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
mw3/Debug/Addition.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
mw3/Debug/Autoupdater.ini
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
mw3/Debug/Autoupdater.ini
Resource
win10v2004-20240802-en
General
-
Target
mw3/Database/usoft.dbd
-
Size
706KB
-
MD5
1f89680d894512f660c6b0499df14a87
-
SHA1
bfea6f406aba9002da6ad7162cd781ac6d8c2a1f
-
SHA256
1ef55bb0fb54461d51bcbb10a3e499ab41d720981cbb097a5e330b43f6b8a530
-
SHA512
2ac4ac6da0e90742ee50a1910fcebccfe1270747e2b9363e97a9e0399c22207bca63711b05d63d90ec43d37288249e4d0af53fb5a65fadb1640ec7e4612dc935
-
SSDEEP
12288:wG9+JaZWhP0A+IxtCYtQ+LznxjS1K0SNKn:V8gZY5+IxcYtQ+LT8E1N8
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\dbd_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\.dbd rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\dbd_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\dbd_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\dbd_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\.dbd\ = "dbd_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\dbd_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\dbd_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3064 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3064 AcroRd32.exe 3064 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2848 2780 cmd.exe 31 PID 2780 wrote to memory of 2848 2780 cmd.exe 31 PID 2780 wrote to memory of 2848 2780 cmd.exe 31 PID 2848 wrote to memory of 3064 2848 rundll32.exe 32 PID 2848 wrote to memory of 3064 2848 rundll32.exe 32 PID 2848 wrote to memory of 3064 2848 rundll32.exe 32 PID 2848 wrote to memory of 3064 2848 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\mw3\Database\usoft.dbd1⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\mw3\Database\usoft.dbd2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\mw3\Database\usoft.dbd"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3064
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD51abcf0d98e1003eb2f826ca160a549a9
SHA13a70a15ba8c908767e1eff6240ef351ad10ea9cd
SHA256789678b062ec6bb8d2403e60279c6185a967beafa4f0e979ca25e7b3577aacf2
SHA512489268dd316bd5870db38506daf9ac14d4ea80492d02efa013bdaef0b28001eb3e6613cc46a716a05f5d03ed0e1db328bcdfb1b29b4c902d694145ce570a28e4