Overview
overview
7Static
static
3HW ON TOP.7z
windows7-x64
7HW ON TOP.7z
windows10-2004-x64
3HW ON TOP/...SE.txt
windows7-x64
1HW ON TOP/...SE.txt
windows10-2004-x64
1HW ON TOP/...V1.exe
windows7-x64
7HW ON TOP/...V1.exe
windows10-2004-x64
7ss.pyc
windows7-x64
3ss.pyc
windows10-2004-x64
3HW ON TOP/PORT.exe
windows7-x64
7HW ON TOP/PORT.exe
windows10-2004-x64
7port.pyc
windows7-x64
3port.pyc
windows10-2004-x64
3HW ON TOP/config.json
windows7-x64
3HW ON TOP/config.json
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 00:44
Behavioral task
behavioral1
Sample
HW ON TOP.7z
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
HW ON TOP.7z
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
HW ON TOP/HOW TO USE.txt
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
HW ON TOP/HOW TO USE.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
HW ON TOP/HW FREE V1.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
HW ON TOP/HW FREE V1.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
ss.pyc
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
ss.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
HW ON TOP/PORT.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
HW ON TOP/PORT.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
port.pyc
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
port.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
HW ON TOP/config.json
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
HW ON TOP/config.json
Resource
win10v2004-20240802-en
General
-
Target
HW ON TOP/config.json
-
Size
163B
-
MD5
62b6ee0a9e09d6daa1b4ff2e33b10554
-
SHA1
ffc9da8bdc2511aefe1d2a2921ac05ba97b6f452
-
SHA256
cf151234ddc0f6937e96e7af0911221fe3560611570c0e3967ec8a4fcfa72d58
-
SHA512
e97078aed131e89f927c1c5ef03ae7b053d78c7b0422b3416cc8e33be43059edaaed09170687c9136455199ae424eca84c9524a3c57283ae73ec8ef7604b2a20
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\.json rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\.json\ = "json_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\json_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\json_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\json_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\json_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\json_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\json_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2560 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2560 AcroRd32.exe 2560 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2744 2784 cmd.exe 31 PID 2784 wrote to memory of 2744 2784 cmd.exe 31 PID 2784 wrote to memory of 2744 2784 cmd.exe 31 PID 2744 wrote to memory of 2560 2744 rundll32.exe 32 PID 2744 wrote to memory of 2560 2744 rundll32.exe 32 PID 2744 wrote to memory of 2560 2744 rundll32.exe 32 PID 2744 wrote to memory of 2560 2744 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\HW ON TOP\config.json"1⤵
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\HW ON TOP\config.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\HW ON TOP\config.json"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2560
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD583eb23f093e8342d3f2156597e0ad1a4
SHA157e4ab2b50a49aa68eb0c5687cd4f6f03f6fa5d0
SHA256744b9368e835b300f562e05b93a94e24a9393ef7f586510eafff8897826c391c
SHA51246e711bd3791e6ff942fdf18c17801b513fc86c2690ab05b962be457781b80040ba0b94eb2915215f1ee543a0bee9f21031ce15b5e9880186f9f9d7e84b73f3c