Overview
overview
10Static
static
3New folder (5).rar
windows7-x64
3New folder (5).rar
windows10-2004-x64
3New folder...es.iso
windows7-x64
3New folder...es.iso
windows10-2004-x64
3New folder...ty.iso
windows7-x64
3New folder...ty.iso
windows10-2004-x64
3New folder...FO.txt
windows7-x64
1New folder...FO.txt
windows10-2004-x64
1New folder...s.json
windows7-x64
3New folder...s.json
windows10-2004-x64
3New folder...ect.js
windows7-x64
3New folder...ect.js
windows10-2004-x64
3New folder...DS.cdn
windows7-x64
3New folder...DS.cdn
windows10-2004-x64
3New folder...gR.dll
windows7-x64
1New folder...gR.dll
windows10-2004-x64
1New folder...NT.txt
windows7-x64
1New folder...NT.txt
windows10-2004-x64
1New folder...er.exe
windows7-x64
7New folder...er.exe
windows10-2004-x64
10Stub.pyc
windows7-x64
3Stub.pyc
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 07:24
Behavioral task
behavioral1
Sample
New folder (5).rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
New folder (5).rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
New folder (5)/GUI/Frames.iso
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
New folder (5)/GUI/Frames.iso
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
New folder (5)/GUI/Quality.iso
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
New folder (5)/GUI/Quality.iso
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
New folder (5)/INFO.txt
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
New folder (5)/INFO.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
New folder (5)/Loader/Frames.json
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
New folder (5)/Loader/Frames.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
New folder (5)/Loader/Gui Connect.js
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
New folder (5)/Loader/Gui Connect.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
New folder (5)/Loader/key_format/KeyBINDS.cdn
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
New folder (5)/Loader/key_format/KeyBINDS.cdn
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
New folder (5)/QllzgR.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
New folder (5)/QllzgR.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
New folder (5)/READ ME!!/DEVELOPMENT.txt
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
New folder (5)/READ ME!!/DEVELOPMENT.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
New folder (5)/Skin Changer.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
New folder (5)/Skin Changer.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Stub.pyc
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Stub.pyc
Resource
win10v2004-20240802-en
General
-
Target
New folder (5)/Loader/Frames.json
-
Size
1KB
-
MD5
776f5aa9b4889732626e2e9ac6aaf165
-
SHA1
7f7586204843e6be078b27007392573c1504799e
-
SHA256
c798342be8ccd4452d42a513aaec635c21b9608b3fa82e54b330f0ae75769d87
-
SHA512
c82b98af32a6e60545861fa2c0f3a0ad488724228ec3aef6a0fbc083e3a95978dbe8fbe16d83d0213342be56b043f1c7e2f82c3909f857b0d5b978dc31c48e85
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\json_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\.json rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\.json\ = "json_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\json_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\json_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\json_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\json_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\json_auto_file\ rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2736 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2736 AcroRd32.exe 2736 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1016 wrote to memory of 2400 1016 cmd.exe 31 PID 1016 wrote to memory of 2400 1016 cmd.exe 31 PID 1016 wrote to memory of 2400 1016 cmd.exe 31 PID 2400 wrote to memory of 2736 2400 rundll32.exe 33 PID 2400 wrote to memory of 2736 2400 rundll32.exe 33 PID 2400 wrote to memory of 2736 2400 rundll32.exe 33 PID 2400 wrote to memory of 2736 2400 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\New folder (5)\Loader\Frames.json"1⤵
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\New folder (5)\Loader\Frames.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\New folder (5)\Loader\Frames.json"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2736
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b2c73c6b92a74ba9c7395f01ba5041a7
SHA182cceeb9249ec880f52dd5af8733d1c321d15630
SHA2563a8bb7b94c2129c289f0f17e391e1e841374a71a1ec60d2685432f2bc1a767e3
SHA51228fd8bb92d269c507b077c17c79471853fe09f68f0e93d97778834c2ed85a7eca960479da584abdd323b4a53c0717e60426e880798b00a15c4a2fb120a02c764