Analysis
-
max time kernel
56s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 16:13
Static task
static1
Behavioral task
behavioral1
Sample
Ashless Campfire.zip
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Ashless Campfire.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
assets/minecraft/models/block/campfire_off.json
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
assets/minecraft/models/block/campfire_off.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
pack.mcmeta
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
pack.mcmeta
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
pack.png
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
pack.png
Resource
win10v2004-20240802-en
General
-
Target
assets/minecraft/models/block/campfire_off.json
-
Size
2KB
-
MD5
d97a01dccf9fb3cd3eeaccd82891f0a5
-
SHA1
79a90e8a9cfa121773c6ac51f52cb35700d96ee4
-
SHA256
b1c70f5a3d20321287ec7ab4e6179baf4edc88c33882b63a1f184b0e704a15e2
-
SHA512
8c38de74326a24b3a6c195972e92d53bb6afa18550c5f266a63095eceb68e9546ea2c63e3fe990242dc21a63b560ccc5d54d1515bfd19a15dba15e747eafb68f
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\json_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\json_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\json_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\json_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\json_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.json rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.json\ = "json_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\json_auto_file\shell\Read\command rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2096 AcroRd32.exe 2096 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2812 3068 cmd.exe 31 PID 3068 wrote to memory of 2812 3068 cmd.exe 31 PID 3068 wrote to memory of 2812 3068 cmd.exe 31 PID 2812 wrote to memory of 2096 2812 rundll32.exe 32 PID 2812 wrote to memory of 2096 2812 rundll32.exe 32 PID 2812 wrote to memory of 2096 2812 rundll32.exe 32 PID 2812 wrote to memory of 2096 2812 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\assets\minecraft\models\block\campfire_off.json1⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\assets\minecraft\models\block\campfire_off.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\assets\minecraft\models\block\campfire_off.json"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2096
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5540e14b0ba4f42bbee956290450bd558
SHA104bf7bdb4cb2cb5a18d7d281f67afd728b530b38
SHA2567e96b6bb0b839de20c3c1e6e7cbeab2da7aa3b6bf0508daf9ec35fde652459d0
SHA5124f36f164003e3db0f6e11df61edc1b05d345f79d79b4d62ba7ad105d8b9b0ef7065ffe141912f40a9c962a02e52c7bb5ef81325d1472533d6d35961ee53c6851