Analysis

  • max time kernel
    42s
  • max time network
    35s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2023 15:01

General

  • Target

    content/cars/nissan_gtr_r35_rocket_bunny/skins/05_Red/livery.png

  • Size

    2KB

  • MD5

    777cf03cff688aa9fac766fb0cb00dbc

  • SHA1

    8d21a094eca79f4a65ed824f8fda6e3e11f52b45

  • SHA256

    46c0a9f5098e99db10cf587d8f9f40c5db115b491e52b14ec11cd0a6530b792f

  • SHA512

    4ed77a1ab423627ab0a183eb7da00a8d386a63a10bf0b37d42bd199be983f2f41cada9f94ca09164f7d91c03dca69e4750f9e732f9b2e0f0550764781872a3a9

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe "C:\Program Files\Windows Photo Viewer\PhotoViewer.dll", ImageView_Fullscreen C:\Users\Admin\AppData\Local\Temp\content\cars\nissan_gtr_r35_rocket_bunny\skins\05_Red\livery.png
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:868

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/868-54-0x0000000000210000-0x0000000000211000-memory.dmp

    Filesize

    4KB

  • memory/868-55-0x0000000000210000-0x0000000000211000-memory.dmp

    Filesize

    4KB