Overview
overview
10Static
static
10riptweakcracked.7z
windows7-x64
7riptweakcracked.7z
windows10-2004-x64
1riptweakcr...nt.pak
windows7-x64
3riptweakcr...nt.pak
windows10-2004-x64
3riptweakcr...nt.pak
windows7-x64
3riptweakcr...nt.pak
windows10-2004-x64
3riptweakcr...tl.dat
windows7-x64
3riptweakcr...tl.dat
windows10-2004-x64
3riptweakcr...af.pak
windows7-x64
3riptweakcr...af.pak
windows10-2004-x64
3riptweakcr...am.pak
windows7-x64
3riptweakcr...am.pak
windows10-2004-x64
3riptweakcr...ar.pak
windows7-x64
3riptweakcr...ar.pak
windows10-2004-x64
3riptweakcr...bg.pak
windows7-x64
3riptweakcr...bg.pak
windows10-2004-x64
3riptweakcr...bn.pak
windows7-x64
3riptweakcr...bn.pak
windows10-2004-x64
3riptweakcr...ca.pak
windows7-x64
3riptweakcr...ca.pak
windows10-2004-x64
3riptweakcr...cs.pak
windows7-x64
3riptweakcr...cs.pak
windows10-2004-x64
3riptweakcr...da.pak
windows7-x64
3riptweakcr...da.pak
windows10-2004-x64
3riptweakcr...de.pak
windows7-x64
3riptweakcr...de.pak
windows10-2004-x64
3riptweakcr...el.pak
windows7-x64
3riptweakcr...el.pak
windows10-2004-x64
3riptweakcr...GB.pak
windows7-x64
3riptweakcr...GB.pak
windows10-2004-x64
3riptweakcr...US.pak
windows7-x64
3riptweakcr...US.pak
windows10-2004-x64
3Analysis
-
max time kernel
1795s -
max time network
1817s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
27/11/2024, 17:25
Behavioral task
behavioral1
Sample
riptweakcracked.7z
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
riptweakcracked.7z
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
riptweakcracked/chrome_100_percent.pak
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
riptweakcracked/chrome_100_percent.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
riptweakcracked/chrome_200_percent.pak
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
riptweakcracked/chrome_200_percent.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
riptweakcracked/icudtl.dat
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
riptweakcracked/icudtl.dat
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
riptweakcracked/locales/af.pak
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
riptweakcracked/locales/af.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
riptweakcracked/locales/am.pak
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
riptweakcracked/locales/am.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
riptweakcracked/locales/ar.pak
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
riptweakcracked/locales/ar.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
riptweakcracked/locales/bg.pak
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
riptweakcracked/locales/bg.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
riptweakcracked/locales/bn.pak
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
riptweakcracked/locales/bn.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
riptweakcracked/locales/ca.pak
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
riptweakcracked/locales/ca.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
riptweakcracked/locales/cs.pak
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
riptweakcracked/locales/cs.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
riptweakcracked/locales/da.pak
Resource
win7-20241023-en
Behavioral task
behavioral24
Sample
riptweakcracked/locales/da.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
riptweakcracked/locales/de.pak
Resource
win7-20241023-en
Behavioral task
behavioral26
Sample
riptweakcracked/locales/de.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
riptweakcracked/locales/el.pak
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
riptweakcracked/locales/el.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
riptweakcracked/locales/en-GB.pak
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
riptweakcracked/locales/en-GB.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
riptweakcracked/locales/en-US.pak
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
riptweakcracked/locales/en-US.pak
Resource
win10v2004-20241007-en
General
-
Target
riptweakcracked/locales/af.pak
-
Size
125KB
-
MD5
46f982ccd1b8a98de5f4f9f1e8f19fe5
-
SHA1
13165653f2336037d4fb42a05a90251d2a4bc5cf
-
SHA256
9e0aeb9d58fecc27d43e39c8c433c444b2ce773cc5d510fc676e0ebbcab4bddf
-
SHA512
2c40e344194df1ca2d2e88dba0cb6c7ef308dd9c83e10bbc45286b5e3bc1d98a424a60ec28b2700606916105968984809321505765078d7caddbb1c4d3f519de
-
SSDEEP
3072:Q4R1VbSVwDwaPwT6HUrLOd+QeeSsL0J6tuBMWoXO3I9GLfXEAbZt1ScE:rR19SVwDwa3qLOds80KO3q
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2548 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2548 AcroRd32.exe 2548 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2740 2848 cmd.exe 31 PID 2848 wrote to memory of 2740 2848 cmd.exe 31 PID 2848 wrote to memory of 2740 2848 cmd.exe 31 PID 2740 wrote to memory of 2548 2740 rundll32.exe 33 PID 2740 wrote to memory of 2548 2740 rundll32.exe 33 PID 2740 wrote to memory of 2548 2740 rundll32.exe 33 PID 2740 wrote to memory of 2548 2740 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\riptweakcracked\locales\af.pak1⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\riptweakcracked\locales\af.pak2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\riptweakcracked\locales\af.pak"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2548
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e25cb16475d899578bf56dc8e94bcb4a
SHA18136df8b590a15442edba69f50a6629ca1d25297
SHA2564a0589e91e7d092d74cfbb67316e2f8d0bfc436b6ee9b91c32184a07e08965ad
SHA512760f4f7943023fea7ff5a1a17cf7a2fffb747d44008541ddb223ed873e203a653bc057245fe7b0dd50fce9c590b1d2575e65d08772fd0bcc914283ea332d94c7