Overview
overview
10Static
static
10testingflr...RV.jar
windows7-x64
1testingflr...RV.jar
windows10-2004-x64
1testingflr...02.jar
windows7-x64
1testingflr...02.jar
windows10-2004-x64
1testingflr...98.jar
windows7-x64
1testingflr...98.jar
windows10-2004-x64
1testingflr....5.jar
windows7-x64
1testingflr....5.jar
windows10-2004-x64
1testingflr...lt.jar
windows7-x64
1testingflr...lt.jar
windows10-2004-x64
1testingflr...et.exe
windows7-x64
8testingflr...et.exe
windows10-2004-x64
8testingflr...r1.exe
windows7-x64
10testingflr...r1.exe
windows10-2004-x64
10testingflr...ns.jar
windows7-x64
1testingflr...ns.jar
windows10-2004-x64
1testingflr...ter.sh
windows7-x64
3testingflr...ter.sh
windows10-2004-x64
3testingflr...ka.exe
windows7-x64
8testingflr...ka.exe
windows10-2004-x64
8Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 01:20
Behavioral task
behavioral1
Sample
testingflrplgpreg-main/DiscordSRV.jar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
testingflrplgpreg-main/DiscordSRV.jar
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
testingflrplgpreg-main/LuckPerms-Bukkit-5.4.102.jar
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
testingflrplgpreg-main/LuckPerms-Bukkit-5.4.102.jar
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
testingflrplgpreg-main/LuckPerms-Bukkit-5.4.98.jar
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
testingflrplgpreg-main/LuckPerms-Bukkit-5.4.98.jar
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
testingflrplgpreg-main/TAB v4.1.5.jar
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
testingflrplgpreg-main/TAB v4.1.5.jar
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
testingflrplgpreg-main/Vault.jar
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
testingflrplgpreg-main/Vault.jar
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
testingflrplgpreg-main/baks-zapret.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
testingflrplgpreg-main/baks-zapret.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
testingflrplgpreg-main/connector1.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
testingflrplgpreg-main/connector1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
testingflrplgpreg-main/plug/voidaddons.jar
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
testingflrplgpreg-main/plug/voidaddons.jar
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
testingflrplgpreg-main/starter.sh
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
testingflrplgpreg-main/starter.sh
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
testingflrplgpreg-main/zapretka.exe
Resource
win7-20241010-en
General
-
Target
testingflrplgpreg-main/starter.sh
-
Size
354B
-
MD5
4ac2e1eb84edfb09be2f9bca9a58de11
-
SHA1
d5ac50e52e5685fe1dd6ab69f8d21fd7f87ce5b6
-
SHA256
1b3f7ab5e2053a2dc592d0a9a798f85eb63aba47a46c5cc8206bb7040573afe6
-
SHA512
45001ba154eb215a476c1ea0dfa5f2bbbc50d120fe2c2a8d63e5f7601a515b8942ea5bbba03e6b9477a75674fe7755473862282aba832602556bbea8cd90c542
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2828 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2828 AcroRd32.exe 2828 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2800 wrote to memory of 2740 2800 cmd.exe rundll32.exe PID 2800 wrote to memory of 2740 2800 cmd.exe rundll32.exe PID 2800 wrote to memory of 2740 2800 cmd.exe rundll32.exe PID 2740 wrote to memory of 2828 2740 rundll32.exe AcroRd32.exe PID 2740 wrote to memory of 2828 2740 rundll32.exe AcroRd32.exe PID 2740 wrote to memory of 2828 2740 rundll32.exe AcroRd32.exe PID 2740 wrote to memory of 2828 2740 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\testingflrplgpreg-main\starter.sh1⤵
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\testingflrplgpreg-main\starter.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\testingflrplgpreg-main\starter.sh"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2828
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD51d9588d3d25c28572ca1b0c951a3a8d2
SHA1a10d54be3d7ac8529eaf270c23872e93625bd9f7
SHA256de095bc1d51d792c03c2415b063e6bae1d1b0405d5973c35aa13d6d275225943
SHA51287c530fe641aa7e580891d9d57da0fe698df8f9c5a83cc59cf5ac8555e05f7d0e23afb72da00216e490e1176d7715482a41c24618b1a1601e33cadf6411a5bf1