Overview
overview
8Static
static
6drive-down...01.zip
windows7-x64
1drive-down...01.zip
windows10-2004-x64
1BlueStacks...s1.exe
windows7-x64
4BlueStacks...s1.exe
windows10-2004-x64
5Custom Hud...YT.png
windows7-x64
1Custom Hud...YT.png
windows10-2004-x64
3FREEFIRE V...YT.zip
windows7-x64
1FREEFIRE V...YT.zip
windows10-2004-x64
1Android/ob...th.jar
windows7-x64
1Android/ob...th.jar
windows10-2004-x64
1com.dts.fr...th.apk
android-9-x86
8icon.png
windows7-x64
3icon.png
windows10-2004-x64
3manifest.json
windows7-x64
3manifest.json
windows10-2004-x64
3com.dts.fr...th.cfg
windows7-x64
3com.dts.fr...th.cfg
windows10-2004-x64
3Analysis
-
max time kernel
125s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/11/2024, 03:29
Static task
static1
Behavioral task
behavioral1
Sample
drive-download-20241117T030056Z-001.zip
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
drive-download-20241117T030056Z-001.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
BlueStacksInstaller_5.21.600.1019_native_a2dd660d2ed14f232e1cf3aea7ede127_MDs1.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
BlueStacksInstaller_5.21.600.1019_native_a2dd660d2ed14f232e1cf3aea7ede127_MDs1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Custom Hud By DANI YT.png
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Custom Hud By DANI YT.png
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
FREEFIRE V7A DANI YT.zip
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
FREEFIRE V7A DANI YT.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Android/obb/com.dts.freefireth/main.2019117682.com.dts.freefireth.jar
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Android/obb/com.dts.freefireth/main.2019117682.com.dts.freefireth.jar
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
com.dts.freefireth.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral12
Sample
icon.png
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
icon.png
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
manifest.json
Resource
win7-20240903-en
Behavioral task
behavioral15
Sample
manifest.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral16
Sample
com.dts.freefireth.cfg
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
com.dts.freefireth.cfg
Resource
win10v2004-20241007-en
General
-
Target
manifest.json
-
Size
1KB
-
MD5
e1ee4de15f98b2a071d56c3c33c6447a
-
SHA1
bff531fbedaeded2512ed22111e448c16dab1b20
-
SHA256
6f393ca0f4a831e573cf6904c4bcbc892dcc827d2bf202864da8b0820224caf9
-
SHA512
ef2d4e3df0d9256710485c1fce1312d28cd9fd05de28c03ad5b890bbcf499421d4eec6830c4f67cdf38624f6b20cd2b53788edc3d447d84eb39e589587f1ce74
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4412 OpenWith.exe