Analysis

  • max time kernel
    132s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/02/2023, 18:52

General

  • Target

    Geometry Dash v2.11/Resources/speedEffect_slow.xml

  • Size

    2KB

  • MD5

    5facd568c76db253d91fc7e0e285c27d

  • SHA1

    f2c4485563780735bee182414b3e26d242a0cc82

  • SHA256

    361e00862c199d0be00a64389d8a8ab030893106819871478d155147bae172f4

  • SHA512

    dceb12c673ff4d0b326c9a0e690bb718990214e6d0d7d1976961115c409f4c71373e2e5753eaf98111b4b27e34d226870b927f7616dae2a015af85ae06d99770

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Geometry Dash v2.11\Resources\speedEffect_slow.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3752
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Geometry Dash v2.11\Resources\speedEffect_slow.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3744
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3744 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:952

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    bd813f25b25946e19e7b3acf153b3674

    SHA1

    1570516b96c7931bd565ac9102e79e1664216997

    SHA256

    6c744ffa4555b4c92c632743742782df3e1b9c33004c73247574da26a759ea2c

    SHA512

    145c738a3702f08d8d307188a4422e3842bc08aced2190f74601d8398d2001cb722e3c32bb6988e35a44a456fb042e6ae833a121da092d21dc2a04683932b47b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    5fae8aecae89f433d37c7fd1602c88e8

    SHA1

    c3876efa01dad676fe511a3a4e29c10f10fa470a

    SHA256

    fd16834b1a39d5dd1b238a0aaf75a94bdc0c9defc5ab04143782369c6a41e595

    SHA512

    e2635d60cab487966c36315806e4bdcb10d99dbafea13be720038ddac380b9d732170134f8c627eb4888939b916f59b1125e9e6b78bf46870f649825813f4859

  • memory/3752-132-0x00007FFB8CBB0000-0x00007FFB8CBC0000-memory.dmp

    Filesize

    64KB

  • memory/3752-133-0x00007FFB8CBB0000-0x00007FFB8CBC0000-memory.dmp

    Filesize

    64KB

  • memory/3752-134-0x00007FFB8CBB0000-0x00007FFB8CBC0000-memory.dmp

    Filesize

    64KB

  • memory/3752-135-0x00007FFB8CBB0000-0x00007FFB8CBC0000-memory.dmp

    Filesize

    64KB

  • memory/3752-136-0x00007FFB8CBB0000-0x00007FFB8CBC0000-memory.dmp

    Filesize

    64KB

  • memory/3752-137-0x00007FFB8CBB0000-0x00007FFB8CBC0000-memory.dmp

    Filesize

    64KB

  • memory/3752-138-0x00007FFB8CBB0000-0x00007FFB8CBC0000-memory.dmp

    Filesize

    64KB

  • memory/3752-139-0x00007FFB8CBB0000-0x00007FFB8CBC0000-memory.dmp

    Filesize

    64KB

  • memory/3752-140-0x00007FFB8CBB0000-0x00007FFB8CBC0000-memory.dmp

    Filesize

    64KB