Overview
overview
8Static
static
3WinRAR Pro...ve.zip
windows7-x64
7WinRAR Pro...ve.zip
windows10-2004-x64
8WinRAR Pro...ve.exe
windows7-x64
8WinRAR Pro...ve.exe
windows10-2004-x64
8content_shell.js
windows7-x64
3content_shell.js
windows10-2004-x64
3ffmpeg.dll
windows7-x64
1ffmpeg.dll
windows10-2004-x64
1icudtl.dat
windows7-x64
3icudtl.dat
windows10-2004-x64
3natives_blob.js
windows7-x64
3natives_blob.js
windows10-2004-x64
3node.dll
windows7-x64
1node.dll
windows10-2004-x64
1resources/app.js
windows7-x64
3resources/app.js
windows10-2004-x64
3resources/electron.js
windows7-x64
3resources/electron.js
windows10-2004-x64
3v8_context...ot.bin
windows7-x64
3v8_context...ot.bin
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 18:04
Static task
static1
Behavioral task
behavioral1
Sample
WinRAR Pro 2024 - Full Active.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
WinRAR Pro 2024 - Full Active.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
WinRAR Pro 2024 - Full Active.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
WinRAR Pro 2024 - Full Active.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
content_shell.js
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
content_shell.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
ffmpeg.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
ffmpeg.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
icudtl.dat
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
icudtl.dat
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
natives_blob.js
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
natives_blob.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
node.dll
Resource
win7-20241023-en
Behavioral task
behavioral14
Sample
node.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
resources/app.js
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
resources/app.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
resources/electron.js
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
resources/electron.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
v8_context_snapshot.bin
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
v8_context_snapshot.bin
Resource
win10v2004-20241007-en
General
-
Target
v8_context_snapshot.bin
-
Size
1.7MB
-
MD5
9f155b6775dd15d10091de0ae97ae246
-
SHA1
0b26abdd21d6b624e27f1c43badc558e78361cd6
-
SHA256
1a47ef6cc2b67e22a39f9d879bd2a4e22bc8a33bc560c93f6d7b167b2b8ce5d8
-
SHA512
0c5290eb33f88456e62caaa8af90f3fc6a5632ed009f610cdd0443fcba62b30401e943d1fd2931323ba306316074796423413c393efaf8632a07d38859ff5b0d
-
SSDEEP
49152:dnvhCK+IJp82Q7t0uUbhX3YUAGu90FOiv642BbN:d5qB
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3032 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3032 AcroRd32.exe 3032 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2860 2372 cmd.exe 31 PID 2372 wrote to memory of 2860 2372 cmd.exe 31 PID 2372 wrote to memory of 2860 2372 cmd.exe 31 PID 2860 wrote to memory of 3032 2860 rundll32.exe 33 PID 2860 wrote to memory of 3032 2860 rundll32.exe 33 PID 2860 wrote to memory of 3032 2860 rundll32.exe 33 PID 2860 wrote to memory of 3032 2860 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\v8_context_snapshot.bin1⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\v8_context_snapshot.bin2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\v8_context_snapshot.bin"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3032
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5aeaf28fcd0ba7c921331610ca1c5b8f1
SHA13bc05148f2a2160a18cf85d8817f2bfb6c2f497b
SHA256068a697c5f49e2e907614a93fbffc0197e07e7daa0dad47d0a58099432e2658a
SHA5126227a8fc596984b74415beda5186032553dc8a54247bc454c42d0a06007730ae012cb525ce1118a3a1475fd424e7a092669552333c2e30a346f93ac47df689bb