Overview
overview
3Static
static
16566 Levia...v29.gz
windows7-x64
36566 Levia...v29.gz
windows10-2004-x64
3archtemp.tar
windows7-x64
3archtemp.tar
windows10-2004-x64
3101dec4f7b.../asset
windows7-x64
1101dec4f7b.../asset
windows10-2004-x64
1101dec4f7b...t.meta
windows7-x64
3101dec4f7b...t.meta
windows10-2004-x64
3101dec4f7b...thname
windows7-x64
1101dec4f7b...thname
windows10-2004-x64
1114d92f595.../asset
windows7-x64
1114d92f595.../asset
windows10-2004-x64
1114d92f595...t.meta
windows7-x64
3114d92f595...t.meta
windows10-2004-x64
3114d92f595...thname
windows7-x64
1114d92f595...thname
windows10-2004-x64
1325fa97ed4.../asset
windows7-x64
1325fa97ed4.../asset
windows10-2004-x64
1325fa97ed4...t.meta
windows7-x64
3325fa97ed4...t.meta
windows10-2004-x64
3325fa97ed4...thname
windows7-x64
1325fa97ed4...thname
windows10-2004-x64
133bc4291f7...t.meta
windows7-x64
333bc4291f7...t.meta
windows10-2004-x64
333bc4291f7...thname
windows7-x64
133bc4291f7...thname
windows10-2004-x64
166c6ad1add...t.meta
windows7-x64
366c6ad1add...t.meta
windows10-2004-x64
366c6ad1add...thname
windows7-x64
166c6ad1add...thname
windows10-2004-x64
18327b7d1e2...et.png
windows7-x64
38327b7d1e2...et.png
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 02:30
Static task
static1
Behavioral task
behavioral1
Sample
6566 Leviant ScreenSpace Ubershader v29.gz
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6566 Leviant ScreenSpace Ubershader v29.gz
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
archtemp.tar
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
archtemp.tar
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
101dec4f7bd2b2e4f88cd908a0a13311/asset
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
101dec4f7bd2b2e4f88cd908a0a13311/asset
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
101dec4f7bd2b2e4f88cd908a0a13311/asset.meta
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
101dec4f7bd2b2e4f88cd908a0a13311/asset.meta
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
101dec4f7bd2b2e4f88cd908a0a13311/pathname
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
101dec4f7bd2b2e4f88cd908a0a13311/pathname
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
114d92f5956657d4da09378841696528/asset
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
114d92f5956657d4da09378841696528/asset
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
114d92f5956657d4da09378841696528/asset.meta
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
114d92f5956657d4da09378841696528/asset.meta
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
114d92f5956657d4da09378841696528/pathname
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
114d92f5956657d4da09378841696528/pathname
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
325fa97ed48886d4991366ada6235f1e/asset
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
325fa97ed48886d4991366ada6235f1e/asset
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
325fa97ed48886d4991366ada6235f1e/asset.meta
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
325fa97ed48886d4991366ada6235f1e/asset.meta
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
325fa97ed48886d4991366ada6235f1e/pathname
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
325fa97ed48886d4991366ada6235f1e/pathname
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
33bc4291f7f7d09438b54d2d209cae78/asset.meta
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
33bc4291f7f7d09438b54d2d209cae78/asset.meta
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
33bc4291f7f7d09438b54d2d209cae78/pathname
Resource
win7-20240705-en
Behavioral task
behavioral26
Sample
33bc4291f7f7d09438b54d2d209cae78/pathname
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
66c6ad1add4795449a1580f0b84af780/asset.meta
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
66c6ad1add4795449a1580f0b84af780/asset.meta
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
66c6ad1add4795449a1580f0b84af780/pathname
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
66c6ad1add4795449a1580f0b84af780/pathname
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
8327b7d1e2f456540aecff7d609a4670/asset.png
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
8327b7d1e2f456540aecff7d609a4670/asset.png
Resource
win10v2004-20240802-en
General
-
Target
33bc4291f7f7d09438b54d2d209cae78/asset.meta
-
Size
172B
-
MD5
076a9c4b92d5db1cee61fe4f0f360a94
-
SHA1
7ffc35bf405249d07602a8f85c76822ad9c70731
-
SHA256
b9d6763414a2c325158468c7cfe4fd9423272f0e5cc3b47db17cd0adda1dc174
-
SHA512
d39a0a40847a60e9a1588bb3fbac159004bece47c23ed1f040dd89d0b74f472367c27b4b77c973890ccfd212fc3e790ca628d44e16bae5530a2930e50d253355
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\meta_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\meta_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\.meta rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\.meta\ = "meta_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\meta_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\meta_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\meta_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\meta_auto_file rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2740 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2740 AcroRd32.exe 2740 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1620 wrote to memory of 1800 1620 cmd.exe 31 PID 1620 wrote to memory of 1800 1620 cmd.exe 31 PID 1620 wrote to memory of 1800 1620 cmd.exe 31 PID 1800 wrote to memory of 2740 1800 rundll32.exe 33 PID 1800 wrote to memory of 2740 1800 rundll32.exe 33 PID 1800 wrote to memory of 2740 1800 rundll32.exe 33 PID 1800 wrote to memory of 2740 1800 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\33bc4291f7f7d09438b54d2d209cae78\asset.meta1⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\33bc4291f7f7d09438b54d2d209cae78\asset.meta2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\33bc4291f7f7d09438b54d2d209cae78\asset.meta"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2740
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD59eed7857877808efa733366771ae326b
SHA144b847a9b0036d1434d082d6e7a53548e1de2b2d
SHA256420ba1e584a137484706d694618adc43908974c37debaf5df601034817f9ff9e
SHA51220bd06c9619d8701284220808b540f818cda34ff2fa43b35b0bdf8532a72291163eb37d3449297ac7f98892024e8184d9f9cd630c14600461fccd4d35596f1a8