Overview
overview
3Static
static
3Data/Data.pkg
windows7-x64
3Data/Data.pkg
windows11-21h2-x64
3Data/MiniGames.pkg
windows10-2004-x64
3Data/MiniGames.pkg
windows11-21h2-x64
3Data/Wallpapers.pkg
windows10-1703-x64
3Data/Wallpapers.pkg
windows11-21h2-x64
3Modmanager.exe
windows10-2004-x64
1Modmanager.exe
windows11-21h2-x64
1Updater.exe
windows10-2004-x64
1Updater.exe
windows11-21h2-x64
1fmodex64.dll
windows10-2004-x64
1fmodex64.dll
windows11-21h2-x64
1unrar.dll
windows7-x64
1unrar.dll
windows11-21h2-x64
1Analysis
-
max time kernel
142s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
03-09-2024 03:41
Static task
static1
Behavioral task
behavioral1
Sample
Data/Data.pkg
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Data/Data.pkg
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
Data/MiniGames.pkg
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
Data/MiniGames.pkg
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
Data/Wallpapers.pkg
Resource
win10-20240611-en
Behavioral task
behavioral6
Sample
Data/Wallpapers.pkg
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
Modmanager.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
Modmanager.exe
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
Updater.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
Updater.exe
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
fmodex64.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
fmodex64.dll
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
unrar.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
unrar.dll
Resource
win11-20240802-en
General
-
Target
Data/Data.pkg
-
Size
1.1MB
-
MD5
aeaec052551a78e1eb781c5bf524abac
-
SHA1
320660749ade56ed3574a8a1fb60b2a1c38caf53
-
SHA256
b365343dde34e06b088815893978932a1364dfefddb92e398be3c0d006cbe3e9
-
SHA512
415696f5445d02d5c87407a7531c80567394a62e7968483676554e1921df45153f851b65c569dc38ce41f69e9b6dc4fd6125936a0b1674c4c8634e7f26929268
-
SSDEEP
24576:onfD2VTF2vXWGjlzAmVskKlVsvdoOOEys5GRCyz:ob2SPWGjlUT1lVsvdcExj4
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\pkg_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\pkg_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.pkg rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\pkg_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\pkg_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.pkg\ = "pkg_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\pkg_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\pkg_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1208 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1208 AcroRd32.exe 1208 AcroRd32.exe 1208 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2312 1732 cmd.exe 29 PID 1732 wrote to memory of 2312 1732 cmd.exe 29 PID 1732 wrote to memory of 2312 1732 cmd.exe 29 PID 2312 wrote to memory of 1208 2312 rundll32.exe 32 PID 2312 wrote to memory of 1208 2312 rundll32.exe 32 PID 2312 wrote to memory of 1208 2312 rundll32.exe 32 PID 2312 wrote to memory of 1208 2312 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Data\Data.pkg1⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Data\Data.pkg2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Data\Data.pkg"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1208
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD576f8dfdfa6c82c5a970a540914211e9d
SHA18b3be7eaff4c638552cf1f65274c75e21335ddc4
SHA256df456d145947805e3d38919f37fdafc30e8a2fbb5441cbf233a41cc00c7ad308
SHA5129f26bb6b10b2a646ed2e1c21d4c01a83a06417c5a115d83a0141c1d1f090cc5a6b37c99a9bb8d8125aadacad79d2e080d06e170c64bbc834cc125cfab14edf32