Overview
overview
10Static
static
3R B X 9 5.rar
windows7-x64
3R B X 9 5.rar
windows10-2004-x64
3R B X 9 5/Client.exe
windows7-x64
1R B X 9 5/Client.exe
windows10-2004-x64
1R B X 9 5/...or.exe
windows7-x64
7R B X 9 5/...or.exe
windows10-2004-x64
10R B X 9 5/ai.cfg
windows7-x64
3R B X 9 5/ai.cfg
windows10-2004-x64
3R B X 9 5/cacert.pem
windows7-x64
3R B X 9 5/cacert.pem
windows10-2004-x64
3R B X 9 5/config.vdf
windows7-x64
3R B X 9 5/config.vdf
windows10-2004-x64
3Analysis
-
max time kernel
0s -
max time network
1s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
30-06-2024 07:37
Static task
static1
Behavioral task
behavioral1
Sample
R B X 9 5.rar
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
R B X 9 5.rar
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
R B X 9 5/Client.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
R B X 9 5/Client.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
R B X 9 5/Roblox Executor.exe
Resource
win7-20240419-en
Behavioral task
behavioral6
Sample
R B X 9 5/Roblox Executor.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
R B X 9 5/ai.cfg
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
R B X 9 5/ai.cfg
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
R B X 9 5/cacert.pem
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
R B X 9 5/cacert.pem
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
R B X 9 5/config.vdf
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
R B X 9 5/config.vdf
Resource
win10v2004-20240611-en
General
-
Target
R B X 9 5.rar
-
Size
9.6MB
-
MD5
dd7a3dd6705772279e7b04a4b3fd65a2
-
SHA1
972e75b89f5960c05f08c19403299600b1f99ea5
-
SHA256
6be4d25bd90b841fd9693a567f1983de0d1c4155a62ee066cf5f1837e75c1b06
-
SHA512
bf995bcd03cd05ae9f68e83d98f80cedff2c561eedce1accf4e037374d7238bd4feafa105fbddc38ac0a6c813d279ecc952c8d08f648ff3b09e4776050a35368
-
SSDEEP
196608:oygvM5WtHmTsHsS9TpcJyjjwsnxrjUd79TRlIL0GV:o7MgH4sHf9TpcQwsnxcd7vlIvV
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_Classes\Local Settings rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 2380 wrote to memory of 2668 2380 cmd.exe rundll32.exe PID 2380 wrote to memory of 2668 2380 cmd.exe rundll32.exe PID 2380 wrote to memory of 2668 2380 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\R B X 9 5.rar"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\R B X 9 5.rar2⤵
- Modifies registry class