Analysis

  • max time kernel
    153s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    12/02/2023, 00:43 UTC

General

  • Target

    textures/pebble/diffuse.dds

  • Size

    153KB

  • MD5

    117b951ef79615f345d42c8f07a3614e

  • SHA1

    0aebcfa546b1dad430624cda766bca39b08ddcfe

  • SHA256

    5195510dc112841cdeb6f3c47e2128bc137e8d9db7e7e502d68221a7b42cc441

  • SHA512

    933f1fe28aaeacecef4c8f84390c89cde800f6bbc0a0e6369e62b573931db8092f0ed63c8f87811baeb2f8cc8e4870ddd772d66f4fcade417ec912f96e632882

  • SSDEEP

    6:GZqljoTX/aeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeed:GZmUTX/as

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 10 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\textures\pebble\diffuse.dds
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1988
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\textures\pebble\diffuse.dds
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1916
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\textures\pebble\diffuse.dds"
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:1764

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1764-82-0x0000000076141000-0x0000000076143000-memory.dmp

    Filesize

    8KB

  • memory/1988-54-0x000007FEFBE81000-0x000007FEFBE83000-memory.dmp

    Filesize

    8KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.