Analysis

  • max time kernel
    55s
  • max time network
    58s
  • platform
    windows7_x64
  • resource
    win7-20221111-es
  • resource tags

    arch:x64arch:x86image:win7-20221111-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    31/12/2022, 18:59

General

  • Target

    Warlock_and_Boobs_v0.350.2_Gallery_Mod/decrypter/RgssDecrypter.Lib.dll

  • Size

    10KB

  • MD5

    7364fe51075d704f3aad95cf652de3a1

  • SHA1

    431c635b9c8004b67b3e263c484ca83af5ed5c07

  • SHA256

    119fa385194d9ec7c486e5956aac2012721a1e7f9f2042a07b8bb950ecf33697

  • SHA512

    aaaf17683955d13cd4e46c2b649e2a9efa229b54a3abbbad6e5b9de26fa907aaceb55429086ff235a6b5a76c10896b921046f9436c7e3a04ae7750fc54f7ea36

  • SSDEEP

    96:TRany/8Nzn757f+iqC9TZNBKs7Q3x4mBvmW+uWMqX18sD0gdQl2NDF06zch1+2:+y/AndjNJZFmBvmWvkltYg6Y2d

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\Warlock_and_Boobs_v0.350.2_Gallery_Mod\decrypter\RgssDecrypter.Lib.dll,#1
    1⤵
      PID:948
    • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\Desktop\EnableMerge.xml"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1600
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:700
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:712
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:712 CREDAT:275457 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1284

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1600-54-0x0000000075161000-0x0000000075163000-memory.dmp

            Filesize

            8KB