Overview
overview
10Static
static
1Deadly Bet...1).rar
windows7-x64
3Deadly Bet...1).rar
windows10-2004-x64
3Launcher.exe
windows7-x64
10Launcher.exe
windows10-2004-x64
10WebView2Loader.dll
windows7-x64
1WebView2Loader.dll
windows10-2004-x64
1res_mods/1..._a.pyc
windows7-x64
3res_mods/1..._a.pyc
windows10-2004-x64
3res_mods/1..._a.xml
windows7-x64
3res_mods/1..._a.xml
windows10-2004-x64
1res_mods/1...me.txt
windows7-x64
1res_mods/1...me.txt
windows10-2004-x64
1res_mods/1...me.txt
windows7-x64
1res_mods/1...me.txt
windows10-2004-x64
1updates/icudtl.dat
windows7-x64
3updates/icudtl.dat
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26-08-2024 09:24
Static task
static1
Behavioral task
behavioral1
Sample
Deadly Beta (password 2121).rar
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Deadly Beta (password 2121).rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Launcher.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Launcher.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
WebView2Loader.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
WebView2Loader.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
res_mods/1.23.0.0/scripts/client/gui/mods/mod_a.pyc
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
res_mods/1.23.0.0/scripts/client/gui/mods/mod_a.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
res_mods/1.23.0.0/scripts/client/gui/mods/mod_a.xml
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
res_mods/1.23.0.0/scripts/client/gui/mods/mod_a.xml
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
res_mods/1.24.0.0/readme.txt
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
res_mods/1.24.0.0/readme.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
res_mods/1.25.0.0/readme.txt
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
res_mods/1.25.0.0/readme.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
updates/icudtl.dat
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
updates/icudtl.dat
Resource
win10v2004-20240802-en
General
-
Target
Deadly Beta (password 2121).rar
-
Size
4.1MB
-
MD5
fd43928e9192b49c74be9e3228831088
-
SHA1
a4f310330abf5988eef1e69e1c7280df5bcee923
-
SHA256
3e0faf2368d158b927fe8ddf8cc45c18465fd663545652dcf11812db0e039429
-
SHA512
33d181f02812d7179c1e0bdd995bb0ee38bb3b008a908cac91dd18356b025c051f19bb72fb41803d06135cf6fe92b6f1b8af0c934a06601aed9d930ab990f963
-
SSDEEP
98304:f3eCSqzMGzAv3DraKk9rszstKgoGz0jDtVJRb98FPD:fukyvi99rszst7l8tVJRc
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
rundll32.exerundll32.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
rundll32.exepid Process 2628 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
cmd.exerundll32.exedescription pid Process procid_target PID 2672 wrote to memory of 2588 2672 cmd.exe 31 PID 2672 wrote to memory of 2588 2672 cmd.exe 31 PID 2672 wrote to memory of 2588 2672 cmd.exe 31 PID 2588 wrote to memory of 2628 2588 rundll32.exe 32 PID 2588 wrote to memory of 2628 2588 rundll32.exe 32 PID 2588 wrote to memory of 2628 2588 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Deadly Beta (password 2121).rar"1⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Deadly Beta (password 2121).rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Deadly Beta (password 2121).rar3⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2628
-
-