Overview
overview
9Static
static
3CampPinecrest.exe
windows7-x64
7CampPinecrest.exe
windows10-2004-x64
9$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDIR/app-64.7z
windows7-x64
3$PLUGINSDIR/app-64.7z
windows10-2004-x64
3LICENSES.c...m.html
windows7-x64
3LICENSES.c...m.html
windows10-2004-x64
3WorldWars.exe
windows7-x64
1WorldWars.exe
windows10-2004-x64
9d3dcompiler_47.dll
windows10-2004-x64
1ffmpeg.dll
windows7-x64
1ffmpeg.dll
windows10-2004-x64
1libEGL.dll
windows7-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows7-x64
1libGLESv2.dll
windows10-2004-x64
1locales/af.ps1
windows7-x64
3locales/af.ps1
windows10-2004-x64
3locales/uk.ps1
windows7-x64
3locales/uk.ps1
windows10-2004-x64
3resources/...nts.js
windows7-x64
3resources/...nts.js
windows10-2004-x64
3resources/...ent.js
windows7-x64
3resources/...ent.js
windows10-2004-x64
3resources/...ode.js
windows7-x64
3Resubmissions
02-09-2024 21:14
240902-z3rgpsxcnm 902-09-2024 21:08
240902-zyvnkaxbqj 902-09-2024 20:57
240902-zrx54sxapk 902-09-2024 20:52
240902-znsffsxajm 9Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02-09-2024 20:52
Static task
static1
Behavioral task
behavioral1
Sample
CampPinecrest.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
CampPinecrest.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/app-64.7z
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/app-64.7z
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
LICENSES.chromium.html
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
LICENSES.chromium.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
WorldWars.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
WorldWars.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
d3dcompiler_47.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
ffmpeg.dll
Resource
win7-20240704-en
Behavioral task
behavioral19
Sample
ffmpeg.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral20
Sample
libEGL.dll
Resource
win7-20240708-en
Behavioral task
behavioral21
Sample
libEGL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral22
Sample
libGLESv2.dll
Resource
win7-20240729-en
Behavioral task
behavioral23
Sample
libGLESv2.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral24
Sample
locales/af.ps1
Resource
win7-20240704-en
Behavioral task
behavioral25
Sample
locales/af.ps1
Resource
win10v2004-20240802-en
Behavioral task
behavioral26
Sample
locales/uk.ps1
Resource
win7-20240705-en
Behavioral task
behavioral27
Sample
locales/uk.ps1
Resource
win10v2004-20240802-en
Behavioral task
behavioral28
Sample
resources/app.asar.unpacked/node_modules/hbo-dnsd/constants.js
Resource
win7-20240704-en
Behavioral task
behavioral29
Sample
resources/app.asar.unpacked/node_modules/hbo-dnsd/constants.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral30
Sample
resources/app.asar.unpacked/node_modules/hbo-dnsd/convenient.js
Resource
win7-20240704-en
Behavioral task
behavioral31
Sample
resources/app.asar.unpacked/node_modules/hbo-dnsd/convenient.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral32
Sample
resources/app.asar.unpacked/node_modules/hbo-dnsd/encode.js
Resource
win7-20240708-en
General
-
Target
$PLUGINSDIR/app-64.7z
-
Size
79.3MB
-
MD5
145e3c59325d2d09ea513217f8f43c25
-
SHA1
7b429b268c8667fb0730ead71bd27ef65a1c32a1
-
SHA256
0f19ceac32b5ae578c4fde9bd9ae635a6487af5c421407a5f0b266957b62fef1
-
SHA512
38c5101420eae94020ff795461265ee47ccb6d71144a0ce22e3302af82e1ba811b92d4d9f977bc5ca7d1126b9ad21760095a2db27a0cc66d40aafa393e0025ed
-
SSDEEP
1572864:wJ39KZD4y9MXs6IB8ceyIS7nqYdd6hIEhSmn6nlN/RF4:rj9M86I/vP7nMhJnUXRi
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3048 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3048 AcroRd32.exe 3048 AcroRd32.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2848 2212 cmd.exe 32 PID 2212 wrote to memory of 2848 2212 cmd.exe 32 PID 2212 wrote to memory of 2848 2212 cmd.exe 32 PID 2848 wrote to memory of 2728 2848 rundll32.exe 33 PID 2848 wrote to memory of 2728 2848 rundll32.exe 33 PID 2848 wrote to memory of 2728 2848 rundll32.exe 33 PID 2728 wrote to memory of 3048 2728 rundll32.exe 35 PID 2728 wrote to memory of 3048 2728 rundll32.exe 35 PID 2728 wrote to memory of 3048 2728 rundll32.exe 35 PID 2728 wrote to memory of 3048 2728 rundll32.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z1⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3048
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5c503ce474337e9a68ba68d9006031ee3
SHA160157fe1871ed83254ff6fee914e58405f4b111a
SHA256725f838a3c605e946efdf79908f584491c290c48ad5db717ef2e3a337b1ef2bd
SHA512670f99f13656b1b1e1a84d9356a1ba2bb4f99eaa0dab09ce98ddc6c90c943ffa5c9c2b1407de9ea4d2d627a15a7b632cdedc60071f29b0047931386bedbd6012