Analysis

  • max time kernel
    70s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    07/02/2023, 18:52

General

  • Target

    Geometry Dash v2.11/Resources/portalEffect08.xml

  • Size

    2KB

  • MD5

    3ad3d9da606ed516c11c4a3e5f18e397

  • SHA1

    7e11a1e87a5eddcac47cf2af4a7d527027b690f5

  • SHA256

    b4173c98fbca0d511ddd1e663128419fef669b4f32a79c8fa6db34450422a6be

  • SHA512

    2a89cefcf080bdaadefe1260b7713a7aedc505620e148d1ddb387bc3122a8d738ad065953c3fd8ffb5f2c2317de2a7130d7cf9a8838aabff96963c5f5b29762e

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Geometry Dash v2.11\Resources\portalEffect08.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:580
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1240
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1240 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1280

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\GIEESPGV.txt

          Filesize

          601B

          MD5

          23c346d651dd37d57b7afab7abf004a9

          SHA1

          e6f7822597dc1cff95dcff7c5eaf5b401bfbf276

          SHA256

          f343b3891cd9256c4e08bd4054ee57c6628a86d69987b5971ffa3b5e460d7822

          SHA512

          2e67d2f15847777c8d522cbf103d423573bc27a248eee4ee99978365bfe9a0880d4a0b92321ae62d4d39c10a8f8ca58fbda4326a0b981e09a3971994b6e4c24c

        • memory/1944-54-0x0000000074DA1000-0x0000000074DA3000-memory.dmp

          Filesize

          8KB