Analysis
-
max time kernel
149s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20230220-es -
resource tags
arch:x64arch:x86image:win7-20230220-eslocale:es-esos:windows7-x64systemwindows -
submitted
13/05/2023, 15:37
Static task
static1
Behavioral task
behavioral1
Sample
game.save
Resource
win7-20230220-es
5 signatures
150 seconds
General
-
Target
game.save
-
Size
2.0MB
-
MD5
4e3613ca10c830e95edc63db2707011b
-
SHA1
1a3678ac4204e3e040cdb78ea31a774cf6cb58fa
-
SHA256
7175b9bdc37489e62fecf76eeec45097a620224f46bdf8d114f9f58e39b5ea2e
-
SHA512
7a42ed13407d6bdb2453e8b4b544d24280bf59119d5c259ef95230ade1bd79550eecf197699e303de7e22531dcd49a5a67d1346aeb85e3d8778125778e5893f2
-
SSDEEP
49152:8J53pZyr6l7+cfbYjz/jmeEj5eYtAK5/Co3gExMinxgQ:03er65+cUjzLjPpsCWta+xb
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\save_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\.save\ = "save_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\save_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\save_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\save_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\.save rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\save_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\save_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 900 rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1268 AcroRd32.exe 1268 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1052 wrote to memory of 900 1052 cmd.exe 29 PID 1052 wrote to memory of 900 1052 cmd.exe 29 PID 1052 wrote to memory of 900 1052 cmd.exe 29 PID 900 wrote to memory of 1268 900 rundll32.exe 30 PID 900 wrote to memory of 1268 900 rundll32.exe 30 PID 900 wrote to memory of 1268 900 rundll32.exe 30 PID 900 wrote to memory of 1268 900 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\game.save1⤵
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\game.save2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\game.save"3⤵
- Suspicious use of SetWindowsHookEx
PID:1268
-
-