Analysis

  • max time kernel
    76s
  • max time network
    163s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07/02/2023, 18:52

General

  • Target

    Geometry Dash v2.11/Resources/trailEffect.xml

  • Size

    2KB

  • MD5

    d1071bd12eba2f668474950b17056c0c

  • SHA1

    ce8bfc6875f3b98b36f5100bc6be6ff89e4f194f

  • SHA256

    07a28b7f74882773e7e0d3c96f470d0be3347cca777bc11f0859627e8ba7d53f

  • SHA512

    f796b0ec322cfec72b00bb01ae75d0669d76a213a5c6df62ebdc040a0fa491dcd766a6608bb69601b5d484c856f230ba667627c397b16412b2c32d9040ae2f8c

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Geometry Dash v2.11\Resources\trailEffect.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2028
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2032
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2032 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1016

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\ML3GW5MN.txt

    Filesize

    604B

    MD5

    001c665e1b70cb395ea20666f245f94c

    SHA1

    7ce8222214b39775d92ae6da642c4de1f79c4d06

    SHA256

    4de5172c38895c7af38019b6e4d4cd0aea6ea356e1add7e7ad8a50b09952241b

    SHA512

    6f0581ca14b03801cdb828c748de154cd368d1ca1f9aba15a6adb1e00b4ed325c3f38feef2cea94807824c38cf0ffdd516c42f39d2b41f44a1ad093b9c2145b1

  • memory/1732-54-0x0000000075771000-0x0000000075773000-memory.dmp

    Filesize

    8KB