Analysis

  • max time kernel
    146s
  • max time network
    160s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    07/02/2023, 18:52

General

  • Target

    Geometry Dash v2.11/Resources/stoneHit.xml

  • Size

    2KB

  • MD5

    e3a4026b370dfa7c5cc5075162033a14

  • SHA1

    d3aa2fe4b23576ab9a8b3bc98f6791ee8f92a08e

  • SHA256

    24dffcf657bb086c7ae5eeb8a84bfc3db981356f7690360bfb0a64d55ef313d2

  • SHA512

    c0eec0f6d866d35879f416957c18b568aad4408522d0ed6ef8b9064039768af86d9d082b670baa83400b1b67940755913de2a90d8b225183eb762036c6a5b2f4

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Geometry Dash v2.11\Resources\stoneHit.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:908
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:944
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:876
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:876 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1432

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\5SDDKXKD.txt

    Filesize

    604B

    MD5

    2fbf5f5829b2e199bc328e467fb85e0c

    SHA1

    1c540d62a378438c227023f3c1b4e62b674ac5a6

    SHA256

    65ca13aa5592200d24e138b62b60c5daec09fbc5e68825f3c23b9321f1e0eb6b

    SHA512

    47d12395b4ee26dd3f38cbcea941b72482684c7b8fda720b6575fb29f0a6c1654104199e9887f0a4924d280485a2f905868ee249388ea35122cf064daf65fd97

  • memory/908-54-0x0000000075C81000-0x0000000075C83000-memory.dmp

    Filesize

    8KB