Overview
overview
3Static
static
3Surs.zip
windows11-21h2-x64
1.gitattributes
windows11-21h2-x64
3.gradle/7....s.lock
windows11-21h2-x64
3.gradle/7....ry.bin
windows11-21h2-x64
3.gradle/7....y.lock
windows11-21h2-x64
3.gradle/7....ld.bin
windows11-21h2-x64
3.gradle/7....es.bin
windows11-21h2-x64
3.gradle/7....s.lock
windows11-21h2-x64
3.gradle/bu...p.lock
windows11-21h2-x64
3.gradle/bu...erties
windows11-21h2-x64
3.gradle/bu...es.bin
windows11-21h2-x64
3.gradle/ch...s.lock
windows11-21h2-x64
3.gradle/ch...ms.bin
windows11-21h2-x64
3.gradle/ch...ms.bin
windows11-21h2-x64
3.idea/.gitignore
windows11-21h2-x64
3.idea/Spac...on.xml
windows11-21h2-x64
1.idea/compiler.xml
windows11-21h2-x64
1.idea/gradle.vbs
windows11-21h2-x64
1.idea/jarR...es.xml
windows11-21h2-x64
1.idea/misc.xml
windows11-21h2-x64
1.idea/runC...nt.xml
windows11-21h2-x64
1.idea/runC...er.xml
windows11-21h2-x64
1.idea/uiDesigner.xml
windows11-21h2-x64
1.idea/workspace.xml
windows11-21h2-x64
1build.gradle
windows11-21h2-x64
3build/_app...og.txt
windows11-21h2-x64
3build/nati...32.dll
windows11-21h2-x64
3build/nati...64.dll
windows11-21h2-x64
1build/reso....dylib
windows11-21h2-x64
3build/reso...rpc.so
windows11-21h2-x64
3build/reso...pc.dll
windows11-21h2-x64
1build/reso...pc.dll
windows11-21h2-x64
3Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-11-2024 16:25
Static task
static1
Behavioral task
behavioral1
Sample
Surs.zip
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
.gitattributes
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
.gradle/7.1/dependencies-accessors/dependencies-accessors.lock
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
.gradle/7.1/executionHistory/executionHistory.bin
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
.gradle/7.1/executionHistory/executionHistory.lock
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
.gradle/7.1/fileChanges/last-build.bin
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
.gradle/7.1/fileHashes/fileHashes.bin
Resource
win11-20241023-en
Behavioral task
behavioral8
Sample
.gradle/7.1/fileHashes/fileHashes.lock
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
.gradle/buildOutputCleanup/buildOutputCleanup.lock
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
.gradle/buildOutputCleanup/cache.properties
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
.gradle/buildOutputCleanup/outputFiles.bin
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
.gradle/checksums/checksums.lock
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
.gradle/checksums/md5-checksums.bin
Resource
win11-20241007-en
Behavioral task
behavioral14
Sample
.gradle/checksums/sha1-checksums.bin
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
.idea/.gitignore
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
.idea/Space Horizon.xml
Resource
win11-20241007-en
Behavioral task
behavioral17
Sample
.idea/compiler.xml
Resource
win11-20241023-en
Behavioral task
behavioral18
Sample
.idea/gradle.vbs
Resource
win11-20241007-en
Behavioral task
behavioral19
Sample
.idea/jarRepositories.xml
Resource
win11-20241007-en
Behavioral task
behavioral20
Sample
.idea/misc.xml
Resource
win11-20241007-en
Behavioral task
behavioral21
Sample
.idea/runConfigurations/runClient.xml
Resource
win11-20241007-en
Behavioral task
behavioral22
Sample
.idea/runConfigurations/runServer.xml
Resource
win11-20241007-en
Behavioral task
behavioral23
Sample
.idea/uiDesigner.xml
Resource
win11-20241007-en
Behavioral task
behavioral24
Sample
.idea/workspace.xml
Resource
win11-20241007-en
Behavioral task
behavioral25
Sample
build.gradle
Resource
win11-20241007-en
Behavioral task
behavioral26
Sample
build/_applyBinpatches_2/log.txt
Resource
win11-20241007-en
Behavioral task
behavioral27
Sample
build/natives/OpenAL32.dll
Resource
win11-20241007-en
Behavioral task
behavioral28
Sample
build/natives/OpenAL64.dll
Resource
win11-20241007-en
Behavioral task
behavioral29
Sample
build/resources/main/darwin/libdiscord-rpc.dylib
Resource
win11-20241023-en
Behavioral task
behavioral30
Sample
build/resources/main/linux-x86-64/libdiscord-rpc.so
Resource
win11-20241007-en
Behavioral task
behavioral31
Sample
build/resources/main/win32-x86-64/discord-rpc.dll
Resource
win11-20241007-en
Behavioral task
behavioral32
Sample
build/resources/main/win32-x86/discord-rpc.dll
Resource
win11-20241007-en
General
-
Target
Surs.zip
-
Size
16.8MB
-
MD5
9d8f969f75a0ca286c2136bd3f40f715
-
SHA1
0a5c8389756543598fda4f96a6ec39b1a36ebc65
-
SHA256
c1861b06a39280c8a5168f5d7b3f92f7376827e2d5a8f5818c9124ca39b79b5a
-
SHA512
972bd84b72d243cbcb92bbc8cca75a18efa793b6b710e6fccfc8950b60a62349f05c4b3f619dc8d4e7c453174ceaa91545009334caebf49685afef0c670f12f3
-
SSDEEP
393216:ScGZay/zj0EM+uJrbhjq0iNzEFC2ZZuyq1qa1Xdz2ubFnejeLECP:S7aG0NJnhj8p6ZuyGq+l2ubleCf
Malware Config
Signatures
-
Modifies registry class 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" BackgroundTransferHost.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings\MuiCache BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix BackgroundTransferHost.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2700 7zFM.exe 2700 7zFM.exe 2700 7zFM.exe 2700 7zFM.exe 2700 7zFM.exe 2700 7zFM.exe 2700 7zFM.exe 2700 7zFM.exe 2700 7zFM.exe 2700 7zFM.exe 2700 7zFM.exe 2700 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2700 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeRestorePrivilege 2700 7zFM.exe Token: 35 2700 7zFM.exe Token: SeSecurityPrivilege 2700 7zFM.exe Token: SeSecurityPrivilege 2700 7zFM.exe Token: SeSecurityPrivilege 2700 7zFM.exe Token: SeSecurityPrivilege 2700 7zFM.exe Token: SeSecurityPrivilege 2700 7zFM.exe Token: SeSecurityPrivilege 2700 7zFM.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 2700 7zFM.exe 2700 7zFM.exe 2700 7zFM.exe 2700 7zFM.exe 2700 7zFM.exe 2700 7zFM.exe 2700 7zFM.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2700 wrote to memory of 3924 2700 7zFM.exe 80 PID 2700 wrote to memory of 3924 2700 7zFM.exe 80 PID 3924 wrote to memory of 2224 3924 cmd.exe 84 PID 3924 wrote to memory of 2224 3924 cmd.exe 84 PID 3924 wrote to memory of 2000 3924 cmd.exe 85 PID 3924 wrote to memory of 2000 3924 cmd.exe 85 PID 2700 wrote to memory of 1400 2700 7zFM.exe 86 PID 2700 wrote to memory of 1400 2700 7zFM.exe 86 PID 1400 wrote to memory of 2056 1400 cmd.exe 88 PID 1400 wrote to memory of 2056 1400 cmd.exe 88 PID 1400 wrote to memory of 2864 1400 cmd.exe 89 PID 1400 wrote to memory of 2864 1400 cmd.exe 89 PID 2700 wrote to memory of 1572 2700 7zFM.exe 95 PID 2700 wrote to memory of 1572 2700 7zFM.exe 95 PID 1572 wrote to memory of 2932 1572 cmd.exe 97 PID 1572 wrote to memory of 2932 1572 cmd.exe 97 PID 1572 wrote to memory of 4912 1572 cmd.exe 98 PID 1572 wrote to memory of 4912 1572 cmd.exe 98 PID 2700 wrote to memory of 4144 2700 7zFM.exe 101 PID 2700 wrote to memory of 4144 2700 7zFM.exe 101 PID 4144 wrote to memory of 2608 4144 cmd.exe 103 PID 4144 wrote to memory of 2608 4144 cmd.exe 103 PID 4144 wrote to memory of 2988 4144 cmd.exe 104 PID 4144 wrote to memory of 2988 4144 cmd.exe 104 PID 2700 wrote to memory of 4288 2700 7zFM.exe 105 PID 2700 wrote to memory of 4288 2700 7zFM.exe 105 PID 4288 wrote to memory of 3904 4288 cmd.exe 107 PID 4288 wrote to memory of 3904 4288 cmd.exe 107 PID 4288 wrote to memory of 4860 4288 cmd.exe 108 PID 4288 wrote to memory of 4860 4288 cmd.exe 108 PID 2700 wrote to memory of 1748 2700 7zFM.exe 109 PID 2700 wrote to memory of 1748 2700 7zFM.exe 109 PID 1748 wrote to memory of 1368 1748 cmd.exe 111 PID 1748 wrote to memory of 1368 1748 cmd.exe 111 PID 1748 wrote to memory of 2500 1748 cmd.exe 112 PID 1748 wrote to memory of 2500 1748 cmd.exe 112
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Surs.zip"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7zOC8A34B97\gradlew.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava.exe -version3⤵PID:2224
-
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe"java.exe" "-Dorg.gradle.appname=gradlew" -classpath "C:\Users\Admin\AppData\Local\Temp\7zOC8A34B97\\gradle\wrapper\gradle-wrapper.jar" org.gradle.wrapper.GradleWrapperMain3⤵PID:2000
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7zOC8A3FAA7\gradlew.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava.exe -version3⤵PID:2056
-
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe"java.exe" "-Dorg.gradle.appname=gradlew" -classpath "C:\Users\Admin\AppData\Local\Temp\7zOC8A3FAA7\\gradle\wrapper\gradle-wrapper.jar" org.gradle.wrapper.GradleWrapperMain3⤵PID:2864
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7zOC8AE3248\gradlew.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava.exe -version3⤵PID:2932
-
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe"java.exe" "-Dorg.gradle.appname=gradlew" -classpath "C:\Users\Admin\AppData\Local\Temp\7zOC8AE3248\\gradle\wrapper\gradle-wrapper.jar" org.gradle.wrapper.GradleWrapperMain3⤵PID:4912
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7zOC8A8C4C8\gradlew.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava.exe -version3⤵PID:2608
-
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe"java.exe" "-Dorg.gradle.appname=gradlew" -classpath "C:\Users\Admin\AppData\Local\Temp\7zOC8A8C4C8\\gradle\wrapper\gradle-wrapper.jar" org.gradle.wrapper.GradleWrapperMain3⤵PID:2988
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7zOC8A64ED8\gradlew.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava.exe -version3⤵PID:3904
-
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe"java.exe" "-Dorg.gradle.appname=gradlew" -classpath "C:\Users\Admin\AppData\Local\Temp\7zOC8A64ED8\\gradle\wrapper\gradle-wrapper.jar" org.gradle.wrapper.GradleWrapperMain3⤵PID:4860
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7zOC8A148D8\gradlew.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava.exe -version3⤵PID:1368
-
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe"java.exe" "-Dorg.gradle.appname=gradlew" -classpath "C:\Users\Admin\AppData\Local\Temp\7zOC8A148D8\\gradle\wrapper\gradle-wrapper.jar" org.gradle.wrapper.GradleWrapperMain3⤵PID:2500
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:1704
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.131⤵
- Modifies registry class
PID:2028
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD56dfba5b16c9581bdeda814832d433a04
SHA16a263c136290cf417aaf1d07cae8cca9436ef659
SHA256ae5330a2833f1097984cf1ea02f093e9f0454cf837a921cf3add211b1b10b001
SHA512eafaf562a2a289d43d29b3413689e1bdd52737ff88bdf3e7c90d93447fe6521505e51c42a057b82bc70c2121ca6509a07f4bc1a5681153a2a648b2f672dfead2
-
Filesize
46B
MD51ecee20f5ecb63246376bc4580bbfa8b
SHA13167cf4f60f34bee7b883c8fcf5f8d6500317fe9
SHA25657debfbd88a816ebbdb7368e5b1d52dd40e0297d864160c7124b2b7a933ae8e3
SHA51287b85db6f2b8e75ce7ac3a316a289dadc75273742c1ab4020aa6a979631a9526ee7c8f058bc7fad0f3aa48e8a7a0b9602cf89e503fe635697d35df621062107a
-
Filesize
46B
MD5a37bfb37d12cf03dc48a299067c829fa
SHA16b1cd121dc5c2dc77339f773dde1b685357c44c4
SHA25672e0c1f74386a6bb1aeb6be31638e67e9f5ad65ff163897c4774c6ed2992887a
SHA51252774d66e4b49fe289f77870921c3f9af014e9c800afdecf685d9726d5459eb5bc6df085c1eacabda82a166c7be3b83f5a9bb59634ee9d6a0975a0bf17d6e61c
-
Filesize
46B
MD588beb3cd827c2651b312ff457de2b617
SHA1cc6e2c9816ec85787b871ad5dc4d376bad5aed5a
SHA25653f5f591a0fe7f1bcfc8c5dd6b7bdb779f7654e04523bee38e1c46978f3a93a4
SHA512c6515938b46f3c40ff541700e550a573020090856e3ea1a731e6f90d318efa657af91292414dcb8a4fd449c2101db78040dd51f62d8adcee2aca0834101276f8
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\92574e46-b00b-4b7c-92af-b793097f0ac2.down_data
Filesize555KB
MD55683c0028832cae4ef93ca39c8ac5029
SHA1248755e4e1db552e0b6f8651b04ca6d1b31a86fb
SHA256855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e
SHA512aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3
-
Filesize
2KB
MD5b19dcfdb742582b6ccb4e0f4c77791b1
SHA1aad30867c46885fcfc019c318138b0f62fa53172
SHA2562f18fc6abd50803de7b3a225038d284268904c9d13caa6cf81f99365dc876479
SHA5129336d2e0d52322fad871f89130903c8f0a14fa6be6579f653c7959d83d0fde7a99106e7878aa3168713c0ce1a0904f72527ddca99543016dbe54d7fe109fd9eb