Overview
overview
3Static
static
1Plagued PB...ed.zip
windows7-x64
1Plagued PB...ed.zip
windows10-2004-x64
1Plagued PB...n.json
windows7-x64
3Plagued PB...n.json
windows10-2004-x64
3Plagued PB...t.json
windows7-x64
3Plagued PB...t.json
windows10-2004-x64
3Plagued PB...y.json
windows7-x64
3Plagued PB...y.json
windows10-2004-x64
3Plagued PB...s.json
windows7-x64
3Plagued PB...s.json
windows10-2004-x64
3Plagued PB...y.json
windows7-x64
3Plagued PB...y.json
windows10-2004-x64
3Plagued PB...d.json
windows7-x64
3Plagued PB...d.json
windows10-2004-x64
3Plagued PB...t.json
windows7-x64
3Plagued PB...t.json
windows10-2004-x64
3Plagued PB...k.json
windows7-x64
3Plagued PB...k.json
windows10-2004-x64
3Plagued PB...t.json
windows7-x64
3Plagued PB...t.json
windows10-2004-x64
3Plagued PB...g.json
windows7-x64
3Plagued PB...g.json
windows10-2004-x64
3Plagued PB...d.json
windows7-x64
3Plagued PB...d.json
windows10-2004-x64
3Plagued PB...t.json
windows7-x64
3Plagued PB...t.json
windows10-2004-x64
3Plagued PB...l.json
windows7-x64
3Plagued PB...l.json
windows10-2004-x64
3Plagued PB...s.json
windows7-x64
3Plagued PB...s.json
windows10-2004-x64
3Plagued PB...e.json
windows7-x64
3Plagued PB...e.json
windows10-2004-x64
3Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-es -
resource tags
arch:x64arch:x86image:win10v2004-20240802-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
23/08/2024, 05:00
Static task
static1
Behavioral task
behavioral1
Sample
Plagued PBR Deferred.zip
Resource
win7-20240708-es
Behavioral task
behavioral2
Sample
Plagued PBR Deferred.zip
Resource
win10v2004-20240802-es
Behavioral task
behavioral3
Sample
Plagued PBR Deferred/animations/warden.animation.json
Resource
win7-20240708-es
Behavioral task
behavioral4
Sample
Plagued PBR Deferred/animations/warden.animation.json
Resource
win10v2004-20240802-es
Behavioral task
behavioral5
Sample
Plagued PBR Deferred/biomes_client.json
Resource
win7-20240705-es
Behavioral task
behavioral6
Sample
Plagued PBR Deferred/biomes_client.json
Resource
win10v2004-20240802-es
Behavioral task
behavioral7
Sample
Plagued PBR Deferred/entity/warden.entity.json
Resource
win7-20240704-es
Behavioral task
behavioral8
Sample
Plagued PBR Deferred/entity/warden.entity.json
Resource
win10v2004-20240802-es
Behavioral task
behavioral9
Sample
Plagued PBR Deferred/fogs/basalt_deltas.json
Resource
win7-20240705-es
Behavioral task
behavioral10
Sample
Plagued PBR Deferred/fogs/basalt_deltas.json
Resource
win10v2004-20240802-es
Behavioral task
behavioral11
Sample
Plagued PBR Deferred/fogs/cherry.json
Resource
win7-20240729-es
Behavioral task
behavioral12
Sample
Plagued PBR Deferred/fogs/cherry.json
Resource
win10v2004-20240802-es
Behavioral task
behavioral13
Sample
Plagued PBR Deferred/fogs/cold.json
Resource
win7-20240708-es
Behavioral task
behavioral14
Sample
Plagued PBR Deferred/fogs/cold.json
Resource
win10v2004-20240802-es
Behavioral task
behavioral15
Sample
Plagued PBR Deferred/fogs/crimson_forest.json
Resource
win7-20240704-es
Behavioral task
behavioral16
Sample
Plagued PBR Deferred/fogs/crimson_forest.json
Resource
win10v2004-20240802-es
Behavioral task
behavioral17
Sample
Plagued PBR Deferred/fogs/deep_dark.json
Resource
win7-20240704-es
Behavioral task
behavioral18
Sample
Plagued PBR Deferred/fogs/deep_dark.json
Resource
win10v2004-20240802-es
Behavioral task
behavioral19
Sample
Plagued PBR Deferred/fogs/default.json
Resource
win7-20240704-es
Behavioral task
behavioral20
Sample
Plagued PBR Deferred/fogs/default.json
Resource
win10v2004-20240802-es
Behavioral task
behavioral21
Sample
Plagued PBR Deferred/fogs/desert_fog.json
Resource
win7-20240708-es
Behavioral task
behavioral22
Sample
Plagued PBR Deferred/fogs/desert_fog.json
Resource
win10v2004-20240802-es
Behavioral task
behavioral23
Sample
Plagued PBR Deferred/fogs/end.json
Resource
win7-20240705-es
Behavioral task
behavioral24
Sample
Plagued PBR Deferred/fogs/end.json
Resource
win10v2004-20240802-es
Behavioral task
behavioral25
Sample
Plagued PBR Deferred/fogs/forest.json
Resource
win7-20240708-es
Behavioral task
behavioral26
Sample
Plagued PBR Deferred/fogs/forest.json
Resource
win10v2004-20240802-es
Behavioral task
behavioral27
Sample
Plagued PBR Deferred/fogs/hell.json
Resource
win7-20240729-es
Behavioral task
behavioral28
Sample
Plagued PBR Deferred/fogs/hell.json
Resource
win10v2004-20240802-es
Behavioral task
behavioral29
Sample
Plagued PBR Deferred/fogs/ice_plains.json
Resource
win7-20240708-es
Behavioral task
behavioral30
Sample
Plagued PBR Deferred/fogs/ice_plains.json
Resource
win10v2004-20240802-es
Behavioral task
behavioral31
Sample
Plagued PBR Deferred/fogs/jungle.json
Resource
win7-20240704-es
Behavioral task
behavioral32
Sample
Plagued PBR Deferred/fogs/jungle.json
Resource
win10v2004-20240802-es
General
-
Target
Plagued PBR Deferred/fogs/basalt_deltas.json
-
Size
784B
-
MD5
b6eda85fd69c2c4fd69084e267cc9909
-
SHA1
ef204ea6f953a2d92cc964b94c354be976490ae4
-
SHA256
62817ceb012905763c09761653e3c9ca287c38f55b03af349783cace7c70b237
-
SHA512
e55b8161ac8404455023c4dce8da74c0b52c2fc4cc78ca53d393e98c4268fbcdbc9899ea102cb0433153a94e8fe0d3d2935faf5ae2a91d24e9cc3cf077ea909f
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1560 OpenWith.exe -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 1560 OpenWith.exe 1560 OpenWith.exe 1560 OpenWith.exe 1560 OpenWith.exe 1560 OpenWith.exe 1560 OpenWith.exe 1560 OpenWith.exe 1560 OpenWith.exe 1560 OpenWith.exe 1560 OpenWith.exe 1560 OpenWith.exe 1560 OpenWith.exe 1560 OpenWith.exe 1560 OpenWith.exe 1560 OpenWith.exe 1560 OpenWith.exe 1560 OpenWith.exe 1560 OpenWith.exe 1560 OpenWith.exe 1560 OpenWith.exe 1560 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1560 wrote to memory of 4872 1560 OpenWith.exe 95 PID 1560 wrote to memory of 4872 1560 OpenWith.exe 95
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Plagued PBR Deferred\fogs\basalt_deltas.json"1⤵
- Modifies registry class
PID:3972
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Plagued PBR Deferred\fogs\basalt_deltas.json2⤵PID:4872
-