Overview
overview
4Static
static
1__MACOSX/....dle403
windows7-x64
3__MACOSX/....dle403
windows10-2004-x64
3__MACOSX/c..._store
windows7-x64
3__MACOSX/c..._store
windows10-2004-x64
3__MACOSX/c...es.rtf
windows7-x64
3__MACOSX/c...es.rtf
windows10-2004-x64
1__MACOSX/c...03.dmg
macos-10.15-amd64
cr-paddle4..._store
windows7-x64
3cr-paddle4..._store
windows10-2004-x64
3cr-paddle4...es.rtf
windows7-x64
4cr-paddle4...es.rtf
windows10-2004-x64
1cr-paddle4...03.dmg
macos-10.15-amd64
1Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 03:49
Static task
static1
Behavioral task
behavioral1
Sample
__MACOSX/._cr-paddle403
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
__MACOSX/._cr-paddle403
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
__MACOSX/cr-paddle403/._.ds_store
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
__MACOSX/cr-paddle403/._.ds_store
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
__MACOSX/cr-paddle403/._Install Notes.rtf
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
__MACOSX/cr-paddle403/._Install Notes.rtf
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
__MACOSX/cr-paddle403/._cr-paddle403.dmg
Resource
macos-20240711.1-en
Behavioral task
behavioral8
Sample
cr-paddle403/.ds_store
Resource
win7-20240704-en
Behavioral task
behavioral9
Sample
cr-paddle403/.ds_store
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
cr-paddle403/Install Notes.rtf
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
cr-paddle403/Install Notes.rtf
Resource
win10v2004-20240910-en
Behavioral task
behavioral12
Sample
cr-paddle403/cr-paddle403.dmg
Resource
macos-20240711.1-en
General
-
Target
__MACOSX/cr-paddle403/._.ds_store
-
Size
120B
-
MD5
b9a94cc8f4aac450fb21641eaf065c6d
-
SHA1
0bed7e90c2bade9763fa18f1fb4441d31f91c87c
-
SHA256
2f380f4a3d05a8d90c2106f50da75064e9ce57a598599dc5404f8f69a0223aa9
-
SHA512
f1e82573db1da08be076ab30e7d8cff350e15d06765e1bb74e313cf5f93e1df6921893a3589df51e6b18538c21a9df6d3f23fead170e9b3c02993f5b5d4a2f4d
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\ds_store_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\.ds_store rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\.ds_store\ = "ds_store_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\ds_store_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\ds_store_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\ds_store_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\ds_store_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\ds_store_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3036 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3036 AcroRd32.exe 3036 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2148 wrote to memory of 1716 2148 cmd.exe 31 PID 2148 wrote to memory of 1716 2148 cmd.exe 31 PID 2148 wrote to memory of 1716 2148 cmd.exe 31 PID 1716 wrote to memory of 3036 1716 rundll32.exe 33 PID 1716 wrote to memory of 3036 1716 rundll32.exe 33 PID 1716 wrote to memory of 3036 1716 rundll32.exe 33 PID 1716 wrote to memory of 3036 1716 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\__MACOSX\cr-paddle403\._.ds_store1⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\__MACOSX\cr-paddle403\._.ds_store2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\__MACOSX\cr-paddle403\._.ds_store"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3036
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD530df26a1e29512a718d807f7def185ee
SHA158fa3ca06d2738d532a28887c99953b8a426eb02
SHA256222b563aa49a831e6a45dfac73adbeb1736474aacbe7253887202d16ef1a95ce
SHA5122bce4e9bef21686f6df017299efb9399eb785e502cdf0db1ead81afdb6bba579cb28293e3b6cfa98250a563a8f5113edd7842a34010ce97e2855fa1ce806e181