Overview
overview
3Static
static
1Channels/1...ed.txt
windows7-x64
1Channels/1...ed.txt
windows10-2004-x64
1Channels/1...fo.txt
windows7-x64
1Channels/1...fo.txt
windows10-2004-x64
1Channels/1...in.ps1
windows7-x64
3Channels/1...in.ps1
windows10-2004-x64
3Channels/1...gs.txt
windows7-x64
1Channels/1...gs.txt
windows10-2004-x64
1Channels/4...fo.txt
windows7-x64
1Channels/4...fo.txt
windows10-2004-x64
1Channels/4...in.txt
windows7-x64
1Channels/4...in.txt
windows10-2004-x64
1Channels/8...fo.txt
windows7-x64
1Channels/8...fo.txt
windows10-2004-x64
1Channels/S...al.txt
windows7-x64
1Channels/S...al.txt
windows10-2004-x64
1download.log
windows7-x64
1download.log
windows10-2004-x64
1index.json
windows7-x64
3index.json
windows10-2004-x64
3invites.txt
windows7-x64
1invites.txt
windows10-2004-x64
1members.txt
windows7-x64
1members.txt
windows10-2004-x64
1Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 14:10
Static task
static1
Behavioral task
behavioral1
Sample
Channels/1106D9AA-CF32-40F5-88DB-F67B60E18021/file-related.txt
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Channels/1106D9AA-CF32-40F5-88DB-F67B60E18021/file-related.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Channels/1106D9AA-CF32-40F5-88DB-F67B60E18021/info.txt
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Channels/1106D9AA-CF32-40F5-88DB-F67B60E18021/info.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Channels/1106D9AA-CF32-40F5-88DB-F67B60E18021/main.ps1
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
Channels/1106D9AA-CF32-40F5-88DB-F67B60E18021/main.ps1
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Channels/1106D9AA-CF32-40F5-88DB-F67B60E18021/recordings.txt
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Channels/1106D9AA-CF32-40F5-88DB-F67B60E18021/recordings.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Channels/4FBF1742-ECA7-47CA-6ACA-8599C55C6268/info.txt
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Channels/4FBF1742-ECA7-47CA-6ACA-8599C55C6268/info.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Channels/4FBF1742-ECA7-47CA-6ACA-8599C55C6268/main.txt
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Channels/4FBF1742-ECA7-47CA-6ACA-8599C55C6268/main.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Channels/8CE01CC0-882F-4658-9A78-B9AA408651DF/info.txt
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Channels/8CE01CC0-882F-4658-9A78-B9AA408651DF/info.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Channels/Salons textuels/général.txt
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Channels/Salons textuels/général.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
download.log
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
download.log
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
index.json
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
index.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
invites.txt
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
invites.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
members.txt
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
members.txt
Resource
win10v2004-20240802-en
General
-
Target
index.json
-
Size
2KB
-
MD5
dde53175c0125e2ba9e1d0208af96781
-
SHA1
99f3eb2e41e1c1c9569f6c3d34cabbe300deff02
-
SHA256
137cda5d0b7943c12adc0b6d6f556431f6a25adb5a004d3bc3f9ff555513aa5e
-
SHA512
cb3d97412359b162d5db98bf64897966470fe15eca7627bbdda7b7e1fe3b8a82244907b345f311f6f2e2901298ac4e03ca0365ce3aed5bd2f5b83adec10e25d2
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2828 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2828 AcroRd32.exe 2828 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2156 2380 cmd.exe 31 PID 2380 wrote to memory of 2156 2380 cmd.exe 31 PID 2380 wrote to memory of 2156 2380 cmd.exe 31 PID 2156 wrote to memory of 2828 2156 rundll32.exe 33 PID 2156 wrote to memory of 2828 2156 rundll32.exe 33 PID 2156 wrote to memory of 2828 2156 rundll32.exe 33 PID 2156 wrote to memory of 2828 2156 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\index.json1⤵
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\index.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\index.json"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2828
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5110ded4aaac5e71cc310311a67b86f45
SHA16bbb125e321c34e650491009dc18c9bc79e0f5eb
SHA256e29a13ca92b474d211cefe90cd8f6dc5661ab4a2d3ba75e988242d6756687dea
SHA51253191fc579c570aa59cbed348efd51a035ee371b788babbaa223b5827c83b64a040786248179a3269ed536b2980d819bb855e6830d7f9e5fa8a3fd736946165a