Overview
overview
7Static
static
3Nowy Archi...P).zip
windows7-x64
1Nowy Archi...P).zip
windows10-2004-x64
1Bootstrapper.exe
windows7-x64
1Bootstrapper.exe
windows10-2004-x64
7DISCORD
windows7-x64
1DISCORD
windows10-2004-x64
1workspace/IY_FE.iy
windows7-x64
3workspace/IY_FE.iy
windows10-2004-x64
3workspace/...g.json
windows7-x64
3workspace/...g.json
windows10-2004-x64
3workspace/...V4.lua
windows7-x64
3workspace/...V4.lua
windows10-2004-x64
3workspace/...zaphub
windows7-x64
3workspace/...zaphub
windows10-2004-x64
3workspace/flingv2.js
windows7-x64
3workspace/flingv2.js
windows10-2004-x64
3workspace/shaders.js
windows7-x64
3workspace/shaders.js
windows10-2004-x64
3workspace/...99.txt
windows7-x64
1workspace/...99.txt
windows10-2004-x64
1Analysis
-
max time kernel
103s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 20:40
Static task
static1
Behavioral task
behavioral1
Sample
Nowy Archiwum WinRARa (ZIP).zip
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Nowy Archiwum WinRARa (ZIP).zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Bootstrapper.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Bootstrapper.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
DISCORD
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
DISCORD
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
workspace/IY_FE.iy
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
workspace/IY_FE.iy
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
workspace/KavoConfig.json
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
workspace/KavoConfig.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
workspace/Speed Hub X V4.lua
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
workspace/Speed Hub X V4.lua
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
workspace/ZapHub/ZapHubFolder.zaphub
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
workspace/ZapHub/ZapHubFolder.zaphub
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
workspace/flingv2.js
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
workspace/flingv2.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
workspace/shaders.js
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
workspace/shaders.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
workspace/walkerps99.txt
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
workspace/walkerps99.txt
Resource
win10v2004-20240802-en
General
-
Target
workspace/IY_FE.iy
-
Size
687B
-
MD5
c5c3186c368b9a666a5c8fd03ab0b536
-
SHA1
cb90e617357906a891674c4dbf9f953a15575931
-
SHA256
59ad4bfd0faa4f0e3d1a37c64d92d67973bd4bdb3d00d5b215cc1f0d66736b31
-
SHA512
d57a52fcd5768cc11aad3f22b88d23a89812f17dbb12b6a45446390d6e14dd66db8cc6255648c7935babdcc27ce30034da1b43f1aa5ae01418f74bc68eef9197
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\iy_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\iy_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\iy_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\iy_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\iy_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.iy rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.iy\ = "iy_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\iy_auto_file\shell\Read rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2156 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2156 AcroRd32.exe 2156 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2456 2064 cmd.exe 30 PID 2064 wrote to memory of 2456 2064 cmd.exe 30 PID 2064 wrote to memory of 2456 2064 cmd.exe 30 PID 2456 wrote to memory of 2156 2456 rundll32.exe 31 PID 2456 wrote to memory of 2156 2456 rundll32.exe 31 PID 2456 wrote to memory of 2156 2456 rundll32.exe 31 PID 2456 wrote to memory of 2156 2456 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\workspace\IY_FE.iy1⤵
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\workspace\IY_FE.iy2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\workspace\IY_FE.iy"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2156
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD52e229b05286fa93ac24b985dc274910e
SHA1d12b476d40f0e0325c8cfe33c753fe3fcbb5ac84
SHA256418f714f22a32dafbff0253727cb925e82a5a3ada6b6d8ed1f5dda506bdf2e74
SHA512b8848a8d941d8bb1698d748fb0b8fa04f010dde5f9bbd63c57197dfd9b7bedbe49b8009b9a233c28a9f4a4cd85ace765f175f3c1e1091fb789ac0533de777c05