Overview
overview
8Static
static
3WinRAR Pro...ve.zip
windows7-x64
7WinRAR Pro...ve.zip
windows10-2004-x64
8WinRAR Pro...ve.exe
windows7-x64
8WinRAR Pro...ve.exe
windows10-2004-x64
8content_shell.js
windows7-x64
3content_shell.js
windows10-2004-x64
3ffmpeg.dll
windows7-x64
1ffmpeg.dll
windows10-2004-x64
1icudtl.dat
windows7-x64
3icudtl.dat
windows10-2004-x64
3natives_blob.js
windows7-x64
3natives_blob.js
windows10-2004-x64
3node.dll
windows7-x64
1node.dll
windows10-2004-x64
1resources/app.js
windows7-x64
3resources/app.js
windows10-2004-x64
3resources/electron.js
windows7-x64
3resources/electron.js
windows10-2004-x64
3v8_context...ot.bin
windows7-x64
3v8_context...ot.bin
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 18:04
Static task
static1
Behavioral task
behavioral1
Sample
WinRAR Pro 2024 - Full Active.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
WinRAR Pro 2024 - Full Active.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
WinRAR Pro 2024 - Full Active.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
WinRAR Pro 2024 - Full Active.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
content_shell.js
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
content_shell.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
ffmpeg.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
ffmpeg.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
icudtl.dat
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
icudtl.dat
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
natives_blob.js
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
natives_blob.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
node.dll
Resource
win7-20241023-en
Behavioral task
behavioral14
Sample
node.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
resources/app.js
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
resources/app.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
resources/electron.js
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
resources/electron.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
v8_context_snapshot.bin
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
v8_context_snapshot.bin
Resource
win10v2004-20241007-en
General
-
Target
icudtl.dat
-
Size
9.7MB
-
MD5
62ce282dfe0ab8f2a35a529faeb61ac2
-
SHA1
c35d6e4db540518263214697f589c54faac87533
-
SHA256
c3b6588446b4a48e36dc135f9920ad246f5c84fe59c634b4225b009dd1dace13
-
SHA512
a773bf66fcb9a12c1d8f3a760724c8438c7f240617b8099e4e2af979b84676892dbcaa866ca2fad59d2e56493ec3f96f0874e4e6e7fe7ca25e22ea2606e9a853
-
SSDEEP
196608:oEUPty2AZfCHliXUxR0jvzl3Whl/dlTNRq:+12ZGliXUxR0jvzl3Whl/dlZRq
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2752 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2752 AcroRd32.exe 2752 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2192 2160 cmd.exe 31 PID 2160 wrote to memory of 2192 2160 cmd.exe 31 PID 2160 wrote to memory of 2192 2160 cmd.exe 31 PID 2192 wrote to memory of 2752 2192 rundll32.exe 33 PID 2192 wrote to memory of 2752 2192 rundll32.exe 33 PID 2192 wrote to memory of 2752 2192 rundll32.exe 33 PID 2192 wrote to memory of 2752 2192 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\icudtl.dat1⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\icudtl.dat2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\icudtl.dat"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2752
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD585d86f5f07113ea3153b5a45be5e6023
SHA1fdc90a4bf2820addf995d86d21f001ecd85534f4
SHA2560bff71238d51ad34b8c2e85804d647596bcb549ce3bd5c056b6756c7b196ddba
SHA512241908ab99e5c5189ddaaf24e019f93ce29b1470076f6aba7794d8566c4c34dbce504e0ee85a555bf67ac3954fd0d30ddebe4fc9fe4b8b873b4a8648a9c71900