Overview
overview
10Static
static
10artwork/bg...pha.py
windows7-x64
3artwork/bg...pha.py
windows10-2004-x64
3docs/relea...ge.vbs
windows7-x64
1docs/relea...ge.vbs
windows10-2004-x64
1docs/relea...ort.js
windows7-x64
3docs/relea...ort.js
windows10-2004-x64
3docs/relea...st.vbs
windows7-x64
1docs/relea...st.vbs
windows10-2004-x64
1docs/relea...ame.js
windows7-x64
3docs/relea...ame.js
windows10-2004-x64
3docs/relea...pts.js
windows7-x64
3docs/relea...pts.js
windows10-2004-x64
3docs/relea...ons.js
windows7-x64
3docs/relea...ons.js
windows10-2004-x64
3docs/relea...mon.js
windows7-x64
3docs/relea...mon.js
windows10-2004-x64
3docs/relea...3d.vbs
windows7-x64
1docs/relea...3d.vbs
windows10-2004-x64
1docs/relea...ow.vbs
windows7-x64
1docs/relea...ow.vbs
windows10-2004-x64
1docs/relea...gs.htm
windows7-x64
3docs/relea...gs.htm
windows10-2004-x64
3docs/relea...es.vbs
windows7-x64
1docs/relea...es.vbs
windows10-2004-x64
1docs/sourc...hub.py
windows7-x64
3docs/sourc...hub.py
windows10-2004-x64
3docs/sourc...s.html
windows7-x64
3docs/sourc...s.html
windows10-2004-x64
3docs/source/conf.py
windows7-x64
3docs/source/conf.py
windows10-2004-x64
3plugins/boot.js
windows7-x64
3plugins/boot.js
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13/12/2024, 11:00
Behavioral task
behavioral1
Sample
artwork/bgfx/chains/crt-geom/add_alpha.py
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
artwork/bgfx/chains/crt-geom/add_alpha.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
docs/release/src/emu/diimage.vbs
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
docs/release/src/emu/diimage.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
docs/release/src/emu/ioport.js
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
docs/release/src/emu/ioport.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
docs/release/src/emu/softlist.vbs
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
docs/release/src/emu/softlist.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
docs/release/src/frontend/mame/mame.js
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
docs/release/src/frontend/mame/mame.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
docs/release/src/frontend/mame/mameopts.js
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
docs/release/src/frontend/mame/mameopts.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
docs/release/src/lib/util/options.js
Resource
win7-20241023-en
Behavioral task
behavioral14
Sample
docs/release/src/lib/util/options.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
docs/release/src/osd/modules/lib/osdobj_common.js
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
docs/release/src/osd/modules/lib/osdobj_common.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
docs/release/src/osd/modules/render/drawd3d.vbs
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
docs/release/src/osd/modules/render/drawd3d.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
docs/release/src/osd/windows/window.vbs
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
docs/release/src/osd/windows/window.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
docs/release/src/osd/winui/help/docs/Command Line Settings.htm
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
docs/release/src/osd/winui/help/docs/Command Line Settings.htm
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
docs/release/src/osd/winui/properties.vbs
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
docs/release/src/osd/winui/properties.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
docs/source/_ext/edit_on_github.py
Resource
win7-20241023-en
Behavioral task
behavioral26
Sample
docs/source/_ext/edit_on_github.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
docs/source/_templates/versions.html
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
docs/source/_templates/versions.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
docs/source/conf.py
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
docs/source/conf.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
plugins/boot.js
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
plugins/boot.js
Resource
win10v2004-20241007-en
General
-
Target
artwork/bgfx/chains/crt-geom/add_alpha.py
-
Size
737B
-
MD5
9bcdfbb00e1588f0c3f9a0edec071b5d
-
SHA1
5382d6519eb42b4a2a577f2fd539f22152cf8881
-
SHA256
25605c1ab89408fbc9aeb7fdcd0462cedb64532e3918edeadd456b86923318b4
-
SHA512
56e934e63baeaba6f95c96757f8b5d3985dbdbbaf7012872074a41e634a022ff32171d871aad64fe11ae098430e7b67eac0923314c721795c461c45de946fcf2
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3016 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3016 AcroRd32.exe 3016 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2944 wrote to memory of 3052 2944 cmd.exe 31 PID 2944 wrote to memory of 3052 2944 cmd.exe 31 PID 2944 wrote to memory of 3052 2944 cmd.exe 31 PID 3052 wrote to memory of 3016 3052 rundll32.exe 32 PID 3052 wrote to memory of 3016 3052 rundll32.exe 32 PID 3052 wrote to memory of 3016 3052 rundll32.exe 32 PID 3052 wrote to memory of 3016 3052 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\artwork\bgfx\chains\crt-geom\add_alpha.py1⤵
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\artwork\bgfx\chains\crt-geom\add_alpha.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\artwork\bgfx\chains\crt-geom\add_alpha.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3016
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5817a96e1df4418727b68e3a857cd249e
SHA1062c36c3b68db8f3662ebf5199fefed2c931fd09
SHA2567a6eb93546d0a5c954957670a2910c57f4e36d9a1e91732f2a0127e2128d6d38
SHA5124158a911b304987e8d8b88b954e91d1784039aa0444d37a5a096d2c1065b45ce83913c629187246c251a4c2e81c347e11a6a2c187655df58e93d819f81811cad