Analysis

  • max time kernel
    134s
  • max time network
    162s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    16/08/2023, 01:43

General

  • Target

    Geometry Dash/Resources/LevelData.xml

  • Size

    1004KB

  • MD5

    77a91cb766747229e07a02d6524f282d

  • SHA1

    80f9256025eac4f4579064799fc214adf549c489

  • SHA256

    3972383e72a969edd67dae0c1d52fbf6770e2fe0c23e56e7e5115df3288eb250

  • SHA512

    9a56e678258b07e835dfc83c46eeabddb2a14451cbbf8b7a36384be5312ed44493ca9d2bb91ea73e4b8d7b15b78b1cf8f61f8ac9d8fe031e890562bb0d447d85

  • SSDEEP

    24576:YufrkMfl5h/pxwEci5XmfSAm5kIYyb7rlYVxYA+:bfrrp/pJcEmRs7ZIY

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Geometry Dash\Resources\LevelData.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2812
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2272
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2404
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2404 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    321a5654cb1d1a63e2dc79ac5ae2e568

    SHA1

    2d81a53476db2cedbd8de4e32dc6b49f4de99f69

    SHA256

    cc7b4712d6bf607b69dc93c0cbba89130d6618cfa2ee340e280ca0c3926a503b

    SHA512

    5f1392a1599778c1af1121f9eefb9a7a9acfda9f95fd907fbafbf4ad118da716caec43ba05a9ed7c0f795e48dd9d0276ea9dff37ca1f5be7f77f73e9b8cd5dc0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    91346d498e62b39d7b2694bd1c81e87f

    SHA1

    65d55dba81779e40e25c546638f6a25466c7ebed

    SHA256

    3cba32f9b8445cf65f86acfb7eaaecfa5a160b86370af226166a1854c6e8ee4e

    SHA512

    be6c4276a7718aa3184d0cd6d6a94c270ac7d53318058759604c1103d56d0a4f53648dc718736aba698ee13defa2190ed18f8e8b4c4e1575567d651f1353c0e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    86044262ebf91802a510c8e577aa0e48

    SHA1

    981c223ccc2c66db77eb170da4f97b9673c9e97c

    SHA256

    5766f1fd387fa458473d67adb2a7e3e6625c6270af1e818299e851bc6a35a699

    SHA512

    fc8a30f3cb0520bd0ae3b17bcc377f5ff452d07e1a2133d694c7e7402bba14cddee6ef685bbfbbc618fd12d3492deb861cc9ee2f989dd0a13a3f3387e951b9ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bdf0a86376904d455323212b477de9b0

    SHA1

    d87671afd92b9e09ce618039f5433c90c32f056c

    SHA256

    938ee3298f097433be3be3d67018d27e219e48cbc8dbf9afd4cff479cc9b7e73

    SHA512

    c3c3d0cbaaa462447086b740daafb02e5b84cd60482a500253b346994fadaff88bfd9dc1899196d10b19ffaa4d5aa8d4457a3b8a125d7eb36bcad4a6bf54623e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7cf224e8d067c565bbbff26036862ecb

    SHA1

    d9c2196aa630302dd1e1df36781b0ce5c7fd3575

    SHA256

    2554cd613e62fa6206f97992da5a02aaad66167045ebe386c192bbf92df9d9c9

    SHA512

    1f942d7dedaf36048a3991878fa35cfa7b249443beb850e80bbf6713aabf8f368226b036074827ba6d264a4c2b9c63d5c336d7870bfa6b99df23af8a6127ba5c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cf78cc3743c4c9910e2ff650fcd2d1ee

    SHA1

    c1c3374ff882beb50cda653b2456ea50a89b93f6

    SHA256

    60d005c489f31cdeb26f8d203a46d55a1cc06af8f019b35cc2bc8b0e0a0f4932

    SHA512

    1c6c252ec0da530c7fe2aeebed765e5190718bbdddca461c68107ac50807fb887adbe57a6450c8c194d7795949df3a0dc05d52b871fc1dc169d198cbce580d5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    358602aa072107c80219ab8c033c9ea2

    SHA1

    6cdc38fa982fc7da5e5075f34a461003914e9f2d

    SHA256

    3e21cd4bca6f6ccc66d253f926ccbe42b7196a8f0f19a37e870f71383769df51

    SHA512

    cf4662638b520161509bfdc0969772979f63462a2fb9120e6654f71ad1774fd4ed86acaf040935b5cf2bb2054b6284ef79cb69f156d1be955cac11954b2e9171

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    471e07152e3ea3f2d8c7fe3677e72da3

    SHA1

    1786cd95eb13cd196ea792d96cca638fbd1ca0f4

    SHA256

    08bf26d4779beee2bec040e19ae14582d9da256d566b07df6c9772f2d90d428e

    SHA512

    8e8bf5300e7ebba029eb0b2e27ede9fbf5562fcdaa0884b16d43dc2346129c4ab95c6a1a00c9157f850e19ea6a9f35e493bb390fc9e9f8cec95b40744a8aed4f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    348e7fa8206717878c00b08541cd4392

    SHA1

    0977c23449f39b1f1292d0f92197704ad0c206f5

    SHA256

    54c4ab4939da0cd9a5c213f47397f662a62cf0ba583b7cb7fe78746c5472322a

    SHA512

    60f1c730fb36d3dcae4e17c39aa9867c6535bc0418168f54069614aada15919f271874b25f78799aa113ab613268c4271921f186822200ad0adaaa31c3b50111

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3af441bcb89545a4e324c71f53f921db

    SHA1

    1b79bfbae038c090f6d664755dbfa5d51569c942

    SHA256

    5170b920e10143a565dd03cc3b81f4c00c84b864704eaf71f5670960f5e0a6b2

    SHA512

    e5d0643b83f462a9393315e9ad466f030566581874584f46ba507f0ae625f6773142094e695549fbcf625ead2d62d257af07786e94a3666331cc3ead2ba016fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f04777aa0c947e56acb75200fdcc052f

    SHA1

    18ef6770df99db5fe1de08930d1fe08828dbc378

    SHA256

    b17b0ab086194a809c74f8bad47485e8de0a434b310d65b1113b2c76ed5bd4a7

    SHA512

    f494451595a8b7559ea1ad1a74cc1b0bd6782db70e0c59a2cb6a468db2f2a7cbd4502c204197227e4b62d7b44ca2f4bc606a139e2678d576f80e45aed530a11e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    36e1d0d3e6342aeb51033ae6c31a6234

    SHA1

    ce4a94b08348a2cd4ce3f8b6e1e59cb4fcffb368

    SHA256

    117c540ce67f91f5777c37ba2afa4ecdc69d8a532616d614f751b026c9923de8

    SHA512

    467a8d25a43702c9dffbfe0d4aeb8e8a661cc0db0177f69b62063a91ff7f1267d76065cc5dec267fd8d270f0fdc785d738ee5ee2c5ab5e378229b4313aee3f15

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8bb1d4dbacf0a0152506d120b922c36c

    SHA1

    5813e518f79385e482f1213d96b4302740d114ca

    SHA256

    2a7fc61df1ac5412f5f188ff99d198bd1974399cff18570a1b0eb160512822c2

    SHA512

    b0c29724fc9a82c02beb1ae931873c73cbe38a85d8f28957d9852593f212037252da47b79f07fa817973626ab4688d026df481f345c5ad375b5977534e0d17cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1b49bb9cc9536e2cecb7be86f066dfe9

    SHA1

    68b94984ab8dfdb7f6a265e28a9edb08ba4a6925

    SHA256

    a2ac9afa6074447512d55ed623044518848d5cf1ceee2762051b529c7ac28a34

    SHA512

    ca5ac08508ed3fc24188cade4518a328b795d7190311ec4bf7c3e0c00dd4f8c89c9168f4283c437323776119bfbd24697f7b993afe8c8c7f17800e5442d3320a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0afff2ab9399f3fc1a8698257b95d74f

    SHA1

    610f15d4b34aa73d27c7200aaf7e46588a1e7600

    SHA256

    ad724720b30d8c4be6f138a65ccaca293b67a190a9605212783b05ade69bf1b6

    SHA512

    670fde05fcabfcf25b5e1798d132fee3216b74456aa3876088b776c4c718abc45e0131d850a28c23aec1c0c8186f1ec2d98ac84aab631394d8aa43cd916fb04e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6d4a553e8bf83f65334f709e0a5d4e93

    SHA1

    5cb58d16d36482fc24a4d88569e450b7c8a5246b

    SHA256

    d76c47bb01240e73aa0adf215d23f971b8132cb92deea78b6b34224dd2ec0c56

    SHA512

    9d7949704d7919d8ea5e912ddd595896379e5b9d4a92ec56e964bdb12fb4130369bcf6dcb4b51b0e29e39edc2c85cadfda966aabc71f8ce10385378366012143

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    19028fcf4d47f24af5ba04b25fba9a31

    SHA1

    4296cc765bdcb506291c9c51f40fa273f81ea121

    SHA256

    1ffa38a863f07a4c4cac17481270894905fe448e4f56f3a01da362f8b92f1b39

    SHA512

    eda0981aef66ee93c2d7a9336ca003eae4229a1cc823ead4c3328e58280cc1834118f029e5ee915e57a158ee9c7e9fbaea0d24d9c282ac40e0366377867732cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f9ea33f49bdd8cf1ff15b56b01dcc91c

    SHA1

    ee9b494e371eb674ab72fc7fbad01ca5823b6be3

    SHA256

    4fb3ca47bd1159823e97d01db739222f5880ba0feb36ee59af872e0ee1198241

    SHA512

    00def0b8d91ee26e053e9438a4e10400910b91914461cd68874b0339c309f3f4f21113e421d62fc4a7ddbee6036b6891dd50155775904a282857a49e57bdaf85

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    74afe2fc0223de55a2bbfeb69e07471c

    SHA1

    2f0ed44363a8ec233851a6d444952c42d415b55b

    SHA256

    179e95e8566e45a19be4a35a72c916cf5c90b6b6978c59737e2ae65521570563

    SHA512

    1435f750e6ac3448f7405ec035bbbc345df04c335c9e362d9cff6efbf0bb2d89135b5da9aca691c836120b845f8335ad75a3f48359384770fee0d783906340dd

  • C:\Users\Admin\AppData\Local\Temp\Cab67BB.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar67FD.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27