Overview
overview
3Static
static
3Encounter Counter.rar
windows7-x64
3Encounter Counter.rar
windows10-2004-x64
3Encounter ...s.json
windows7-x64
3Encounter ...s.json
windows10-2004-x64
3Encounter ...er.exe
windows7-x64
1Encounter ...er.exe
windows10-2004-x64
1Encounter ...er.exe
windows7-x64
1Encounter ...er.exe
windows10-2004-x64
1Encounter ...er.pdb
windows7-x64
3Encounter ...er.pdb
windows10-2004-x64
3Encounter ...g.json
windows7-x64
3Encounter ...g.json
windows10-2004-x64
3Encounter ...on.dll
windows7-x64
1Encounter ...on.dll
windows10-2004-x64
1Encounter ...a.json
windows7-x64
3Encounter ...a.json
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 19:39
Static task
static1
Behavioral task
behavioral1
Sample
Encounter Counter.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Encounter Counter.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Encounter Counter/EncounterCounter.deps.json
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Encounter Counter/EncounterCounter.deps.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Encounter Counter/EncounterCounter.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Encounter Counter/EncounterCounter.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Encounter Counter/EncounterCounter.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Encounter Counter/EncounterCounter.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Encounter Counter/EncounterCounter.pdb
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Encounter Counter/EncounterCounter.pdb
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Encounter Counter/EncounterCounter.runtimeconfig.json
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Encounter Counter/EncounterCounter.runtimeconfig.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Encounter Counter/Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Encounter Counter/Newtonsoft.Json.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Encounter Counter/pokemon_data.json
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Encounter Counter/pokemon_data.json
Resource
win10v2004-20240802-en
General
-
Target
Encounter Counter/EncounterCounter.pdb
-
Size
14KB
-
MD5
314d9568b8c99f3dedf9c9333e3d76b5
-
SHA1
7c31d283fb585059c76035ff2b01f01d2a3b7875
-
SHA256
340970b85d8fcdf7f7e2e2178744af4e3c22b210e3e18462d5113f9a61760a21
-
SHA512
afa7588ab697c4d90b396d1d6770848eea6d1dd395a906aea8c1861f2498917c510f08c0327c3b8d7a73e870e2b7dc1b3412479550ffdae76330aa8cb4c91629
-
SSDEEP
384:UNTIQ+NtpCrtdtB10dapq/6PhR+6KhBicBE9a+20AuVo73HafyEVAn1wF3721cvy:K8QKfCn923QAip7xWf3
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\.pdb rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\.pdb\ = "pdb_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\pdb_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\pdb_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\pdb_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\pdb_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\pdb_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\pdb_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2880 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2880 AcroRd32.exe 2880 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2104 wrote to memory of 1500 2104 cmd.exe 31 PID 2104 wrote to memory of 1500 2104 cmd.exe 31 PID 2104 wrote to memory of 1500 2104 cmd.exe 31 PID 1500 wrote to memory of 2880 1500 rundll32.exe 33 PID 1500 wrote to memory of 2880 1500 rundll32.exe 33 PID 1500 wrote to memory of 2880 1500 rundll32.exe 33 PID 1500 wrote to memory of 2880 1500 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Encounter Counter\EncounterCounter.pdb"1⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Encounter Counter\EncounterCounter.pdb2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Encounter Counter\EncounterCounter.pdb"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2880
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5c722caf7f6c83f971785edabb3bc96f0
SHA1fb9012ad4d08e8b2149efdd0501390b1c125c738
SHA2566b2e81786224fad7b94fb576b012e7fa0e4fcf004f8497665036f85e5aec0fdb
SHA5123af5d510b043ea9f2c8fc527fb06f45eb94276f130b407cc900394b49c403f073d439dad092e2fa85a58011e64f0ced01aec0e764e8a817f2aec380a822d1f37