Overview
overview
10Static
static
1redesigned...in.zip
windows7-x64
10redesigned...in.zip
windows10-2004-x64
1redesigned...er.zip
windows7-x64
1redesigned...er.zip
windows10-2004-x64
1LunarLauncher.zip
windows7-x64
1LunarLauncher.zip
windows10-2004-x64
1Info.txt
windows7-x64
1Info.txt
windows10-2004-x64
1redesigned...er.zip
windows7-x64
1redesigned...er.zip
windows10-2004-x64
1Info.txt
windows7-x64
1Info.txt
windows10-2004-x64
1redesigned...DME.md
windows7-x64
3redesigned...DME.md
windows10-2004-x64
3Analysis
-
max time kernel
359s -
max time network
360s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-01-2025 01:55
Static task
static1
Behavioral task
behavioral1
Sample
redesigned-octo-adventure-main.zip
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
redesigned-octo-adventure-main.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
redesigned-octo-adventure-main/Installer.zip
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
redesigned-octo-adventure-main/Installer.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
LunarLauncher.zip
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
LunarLauncher.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Info.txt
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
Info.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
redesigned-octo-adventure-main/LunarLauncher.zip
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
redesigned-octo-adventure-main/LunarLauncher.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Info.txt
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Info.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
redesigned-octo-adventure-main/README.md
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
redesigned-octo-adventure-main/README.md
Resource
win10v2004-20241007-en
General
-
Target
redesigned-octo-adventure-main/README.md
-
Size
535B
-
MD5
207abbceb43625f736b5867c28116efb
-
SHA1
fb9efdb30ce2e032010bf7005d49d593ec9c0bb7
-
SHA256
d09eb7e2f5e1e94d5f5416fd3a8515edcfedd80b963816e2bd24d1d29dc5a162
-
SHA512
042480a0b1725d806a69b58197435d7a0e6b750077feaca66cc53db894ad6de70750e0dab6583bf5ec03d9dbef08d9433385ba6b09d373521d2efdaa14a1567e
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2764 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2764 AcroRd32.exe 2764 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2720 2204 cmd.exe 31 PID 2204 wrote to memory of 2720 2204 cmd.exe 31 PID 2204 wrote to memory of 2720 2204 cmd.exe 31 PID 2720 wrote to memory of 2764 2720 rundll32.exe 32 PID 2720 wrote to memory of 2764 2720 rundll32.exe 32 PID 2720 wrote to memory of 2764 2720 rundll32.exe 32 PID 2720 wrote to memory of 2764 2720 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\redesigned-octo-adventure-main\README.md1⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\redesigned-octo-adventure-main\README.md2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\redesigned-octo-adventure-main\README.md"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2764
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD55d640dbf3e82c8d2cd9feae570d02f0f
SHA19f84bc168dd07be465737e8ff05ed47521a9256e
SHA2561d0ced719022b8321ab9a9a595b7bc37aec76eddc28240179b1bdb63d65a6eee
SHA512f1776deb5f008ebf3846c6dd762cd57f9ec9f80a6d73266e1f49bd324db58f2a7f7e28f5b479d03cc7f9af05f2723e0d1509accd10535788f16d3f788b8c7d2d