Overview
overview
9Static
static
7unl.rar
windows7-x64
3unl.rar
windows10-2004-x64
3unl/Spotify.cfg
windows7-x64
3unl/Spotify.cfg
windows10-2004-x64
3unl/blobs/a.ini
windows7-x64
1unl/blobs/a.ini
windows10-2004-x64
1unl/blobs/b.ini
windows7-x64
1unl/blobs/b.ini
windows10-2004-x64
1unl/unl_cracked.exe
windows7-x64
9unl/unl_cracked.exe
windows10-2004-x64
9Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
14-08-2024 01:15
Behavioral task
behavioral1
Sample
unl.rar
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
unl.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
unl/Spotify.cfg
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
unl/Spotify.cfg
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
unl/blobs/a.ini
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
unl/blobs/a.ini
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
unl/blobs/b.ini
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
unl/blobs/b.ini
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
unl/unl_cracked.exe
Resource
win7-20240705-en
General
-
Target
unl/Spotify.cfg
-
Size
51B
-
MD5
a31638f636f3cff044f77338c8a850ab
-
SHA1
ca46698adb72410d35bb56989a369880e503756f
-
SHA256
357a0410620a468d333a5235ec424a3bbc8b330ba16968f381e1c8ffa89dff39
-
SHA512
aafd96f0fda67c76d1cef2ed8ade0717baec758a99e6e110c62c79ae215a5dd1e90c7624adaecd9a68153c94b7ef69e7cc09e1a879ad4568d08b0170e6b66f85
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\cfg_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\.cfg\ = "cfg_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\cfg_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\cfg_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\cfg_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\.cfg rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\cfg_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\cfg_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2828 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2828 AcroRd32.exe 2828 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2952 2336 cmd.exe 31 PID 2336 wrote to memory of 2952 2336 cmd.exe 31 PID 2336 wrote to memory of 2952 2336 cmd.exe 31 PID 2952 wrote to memory of 2828 2952 rundll32.exe 33 PID 2952 wrote to memory of 2828 2952 rundll32.exe 33 PID 2952 wrote to memory of 2828 2952 rundll32.exe 33 PID 2952 wrote to memory of 2828 2952 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\unl\Spotify.cfg1⤵
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\unl\Spotify.cfg2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\unl\Spotify.cfg"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2828
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD512beacc714606138189bc3ef6e279985
SHA15f326786be34f3a23a7e0df7d0d2389edab596cb
SHA256ae106741bccea36d7e1e5a41fb4732588fae16f22ce37f9abd892e6c08609917
SHA5126d8e8e5b638b1d612de3f72ed192cd996f9ab61751e2219399f8366e6bdcca3cef7de23dc4a06a6f107976f9b8838e3abde43823040cdd2dd020b8009dac7396