Analysis

  • max time kernel
    105s
  • max time network
    171s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07/02/2023, 18:52

General

  • Target

    Geometry Dash v2.11/Resources/speedEffect.xml

  • Size

    2KB

  • MD5

    fc793aeecd6256d2fa3f13e583da6810

  • SHA1

    a764fe43d9d4861fe84083a2411e2a4e5c251031

  • SHA256

    9129b5f2cbac908546ce3a6bae5418970ed6e080242a2680779dfbdadc2388da

  • SHA512

    0a20c0da25a16106e30140015f73200f87c6ca23484166692c232f6c659448633da539adf9ba23a4f4edd51b09858807125351d3e6559936a40555176c900626

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Geometry Dash v2.11\Resources\speedEffect.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1588
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:944
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:896
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:896 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1204

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\LQ0J1Q70.txt

    Filesize

    604B

    MD5

    6479550e26880df385cf95fc49c5bc38

    SHA1

    1a24d4b56b3a237e5a2f230c9f39adc4de0f81a1

    SHA256

    68c8695493c56e9ddf760d6a5af55222218f7eaa1f097f6f1913610814af7d1b

    SHA512

    eaada56ce9a4e7179cf96d08e26046d07d17613518c78e1676ce0acbc662f236b963da20a87580a9fc85f40ed1dce439a10ab42c1b78bc1650f925c9e8a2bff3

  • memory/1588-54-0x0000000075CF1000-0x0000000075CF3000-memory.dmp

    Filesize

    8KB