Analysis

  • max time kernel
    118s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    18-07-2023 12:59

General

  • Target

    Among Us v2022.12.14i-Pivigames.blog.rar

  • Size

    244.1MB

  • MD5

    d7951aa0674836da3859a056ff3d3b80

  • SHA1

    d4f9d707654a24e4fe16677c6898054f990c1cae

  • SHA256

    bbcc6444202f68e4154063fe28d7a5bd1dde6de140b7e80d707060bb7dbe1650

  • SHA512

    cdb0b54f71b67ad0d4117215c7eb5ab26ea3d4b0a3a6314584f74af808c5180f6e776dd2db1dc4b730929cd9e5090ad0ce644e83ea5852136e5d26a4762f2580

  • SSDEEP

    3145728:VutNH6ihsRWRi9S10xIO2H0VzM/6vk+NUdjqUMQiD+0oM7QDD4XglRdw8g5cEsO2:VutNH6s49FxDvVi8pN32mTQC4L9sO

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 10 IoCs
  • Suspicious use of SendNotifyMessage 9 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Among Us v2022.12.14i-Pivigames.blog.rar"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Among Us v2022.12.14i-Pivigames.blog.rar
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2360
      • C:\Program Files\VideoLAN\VLC\vlc.exe
        "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Among Us v2022.12.14i-Pivigames.blog.rar"
        3⤵
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:1632

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1632-90-0x000000013F4F0000-0x000000013F5E8000-memory.dmp

    Filesize

    992KB

  • memory/1632-91-0x000007FEF7DB0000-0x000007FEF7DE4000-memory.dmp

    Filesize

    208KB

  • memory/1632-92-0x000007FEF6420000-0x000007FEF66D4000-memory.dmp

    Filesize

    2.7MB

  • memory/1632-93-0x000007FEF4AD0000-0x000007FEF5B7B000-memory.dmp

    Filesize

    16.7MB

  • memory/1632-94-0x000007FEF3550000-0x000007FEF3662000-memory.dmp

    Filesize

    1.1MB