Analysis

  • max time kernel
    138s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    16/08/2023, 01:43

General

  • Target

    Geometry Dash/Resources/LevelDataMeltdown.xml

  • Size

    271KB

  • MD5

    b81c34cc8166bcaf4deb13813100b899

  • SHA1

    dd46b883fa73d64bb98b886f92f09dc2e3d97385

  • SHA256

    070018d75cd0841a17d034d1d4cd5784776c89abcaf21ae362879c7421d3bcc4

  • SHA512

    35bbcd11e55aeb33ea3169c26744262878987b20c0b61689fead2a8bf344694201859d61b9abd6691859bc46dcb939cf35d8753078e77c54820658a1840ebd6d

  • SSDEEP

    6144:83Zx7cVbgRroMJI6pU9iQ0YdElzx0Wh956pJO18OBU02Q:877cqVe6zzlzaWh9yJOKT02Q

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Geometry Dash\Resources\LevelDataMeltdown.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2784
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2380
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2432
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2432 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    09f6e9d4ef4d4ac3e3dc5eec226b5998

    SHA1

    728aa32c9014f190edf48b229c21c30bab4105be

    SHA256

    fd7c71f88518ea0e0c4342fa9bebbd47a12669094b7260f044e9aaaa430c6df8

    SHA512

    e5d67530df2e51fa55c5e863b41bcd562a5b6a4ed0a7e489e03e787b5d6407dbf4ba6d2568981db96a7a01eabb4d55881df4ea53ec9be929b0e04adb89b5b016

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6064d22fd0e33ea316b1866afa2af8c7

    SHA1

    09402c16241271a3ba20ec1458a0de66aee10b72

    SHA256

    df418e99afaa906a9dfaaafe47a487db74e16a001237cf4e590bfe643e3187cb

    SHA512

    529e596cb4a6955f4b81cea3a8b0f13623514aab42a444b875414f0a65ac37e413b1681284f2daaf8ab89d30a2632fa721a09e6280534af926853c3fa767c3a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8ee795e90a76814cc121590ead63c801

    SHA1

    da4c7197890fbaeb9fdbe1767d9f24641e904c6b

    SHA256

    8346faf808893e3c49670e0773a854a86c5d9a521cdd85a84d84d1358703b4c2

    SHA512

    d1b39a67d70e721231c2f55a0a65a3a34fc5bf364aa1d7e5bdebc8f58cc3d9de142d831c07c370db35ce84a4f74858a380852cbbbaf8bf5e57502c85eb3c51d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d2eb8dc3dd5c4409fd5dab12d5ded4bf

    SHA1

    5490d1daed77580e2df6ea964b97bde75367e5bc

    SHA256

    329419b8a07df6610a6e2f23a1bd0b80fbba9bb7674ea19935c1bdfd1ef2850c

    SHA512

    a531d1ae1530d5b70a0ff6a75fd67e6a2e10b53a092dddbfd8b4c11def9e2dfeb394cd9bb00c0ffe8396b365564a823b1ef927f93b0e4beef453a3fa5b484a33

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4e4f226cec87e4552335482b8227acd8

    SHA1

    906f1e0fc0c80d0c6e74652d49f87bfc04c61109

    SHA256

    bbdd5d63fd6b0c9879e1ab5da2b3c61c3dba0c31184aac5c1b942165d78ef3ce

    SHA512

    a66bd76e1fc9d9630d620ac56fcbfdf429b69a924d7b44cbcab792d55a6d5cc58b49e112ab1d0402ca9f4b0336b57cbb009347410800cbf9901a3c05fe5ec96b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    df1f7f6e631032f042b03b6c2ac0b072

    SHA1

    229b0dc429c2b00338cb2d6741a93658c0760935

    SHA256

    76a4decd8bef14b5d1561a9d937e70a8ccbbc107846bf4e6f793ff70531116cd

    SHA512

    797645a8f5a99fe469ebc84395d033e133bb1acf70be1a02f1ca64347db68d0e3c05f67d5a23fbc705c8091222e20d2e914801e2e41c1d277c33bdded72508ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5bfa503bad5d536adefc7527e3c289d2

    SHA1

    d466556a105f7958d39c2eeefe8768a41b069421

    SHA256

    243c8bc8329432927569a11a01b7bcbb69938d3b1901104e0d5834e6f5cb5166

    SHA512

    1bdeacea4c11c31c8b55fa2e02adacf3cfe22c2bd7b87b8ea7d1b8c945a2396be6d21c4a4c553587089b71b505104448ee0f4838e8d859ae8ee2394ef2997c4b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    147ce771dd70a19d2240b51841fe719b

    SHA1

    c8be58b98f6813d501a71b8fc7a32abc4e61287c

    SHA256

    328943d5cd5fed3429811749b0da681e39eb12cc2d9f465f34de6903ae216ddf

    SHA512

    ed6304aeada0322ab557797a7d94a59f306a41a528b8da1a74349109edf27544520b883371bc43db7e00eeb3df0f0fb6366ae96738ec878275f8aaefa0c9f033

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e1ba4ffe44a76fd21d1404c00c51a13b

    SHA1

    d484bcbbf0c3c1af786977450cd19c5c9fb7496c

    SHA256

    fd9b1ea0453bac5e1e5365ada3bd8cd034a4359d5d3252fac045251ea7593860

    SHA512

    f3aa25a143e5debd895a81479c5aae0974437d93c72e09f91fa164cc1fa15f81168e61baea35573d639b7d3e50628e9ce4119c7819c8070f4ba445aee43813eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    aa4ff75ac42c4cf54f91a79b251dc200

    SHA1

    e65bc35de9aaf3b4d4fc59c4d388a47bce3b0e6e

    SHA256

    879bbda9d690fd05b23b82947e57e5f044e5e114474a088909b2aced3105f565

    SHA512

    e0c26f45dce95de2bc0eb9a45bee5a0ef3aa8317fc7881fdf53d1c811bef1609efcca744f12d906981110812bc079ce15d3437060839602ec82ad3cca9171c46

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    15ab2cb12b6a8f8316552d90c1b3ca06

    SHA1

    1645ee4e261d41d7cbc6ca139ebabbca14b0c29a

    SHA256

    871d07131e6a6133292d53aaa523c8d6e91cc76872ccd69cb33bae7c45f62337

    SHA512

    07818fb0fcede4af8f5d2af3361597ef166c85d3f6e32f87de1503e40c0f4985688a9f67a5dc4e6988b0f035300dd895de8fd13526848594600fee91a97f6edf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    df054ece8976c18298da0b7ff4b1342a

    SHA1

    769c32fbf5f78ffaa2ff93fef7a5768e00cfb9ea

    SHA256

    04862ff21e09694d3fdea6175d0524582e514da90b29ac731faa8579b3c95d21

    SHA512

    9c04bb632d4b5bda5923337b250ab1fd64932e69a95de4995d6fdcf66c4f5cb52c6547445f2e8fbbead5f27f908f25ce315b8cc12bf1817b7c4b6192a587d47d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2b4830e1c312c10c1c881ba20874d49c

    SHA1

    156a4ce4c885e5426c48f1309e74b096a0b7b3a5

    SHA256

    c6fc146209cc3af3a4b7a19f6b56468915411d3a16260c96bfa7def432bd2158

    SHA512

    dbe04e802f6aff2377a8a851fefba87ef18b5e6b5d6540a3c8d74333af070478a666dd756a323d371464cee5291bbd7e88123be3fd3027a810d868c31c5bda04

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    445435ad98f4d7ac2e4673fd2a872521

    SHA1

    d6a47f71ed80f64a924e90916108f58fd197d003

    SHA256

    17c252798ed320c6904c3617f264857d56f7946f823bec4253a5c863488372fe

    SHA512

    dfd5eeee3cd8992242651c7c116e06f5405fe523c31f2881c50874582d24d79b8aace17a9b14f02eefb627f36b5e9e218956dd1c2b7f1c825666e6fc4231fbf4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    388612bbb3e3fac38b763270d7e08984

    SHA1

    128abc48a7277f3495f2b6707773367a062690f3

    SHA256

    8e426770641fc9698fad3cb576cbcc30c47de5e51bbbacd83f0cabd5d1a2a102

    SHA512

    b25601b9c2c5dfa73aac4bf7bdac17da7bcc4607be72d2731c3ebc789d51101ac2166dbfab15b28d5f94f0f5b591d494c6387f6153f5e97936fabd5fb93a95b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    01c015d1e507243999e1cea41cc05edb

    SHA1

    3d2922c62749e6138088f5f382e018b9bfa6bdff

    SHA256

    3a033b74f1cb54d6ac01e0c616b46373c5a5aacab67c9d85a5e2bf80665d5a23

    SHA512

    482b387f497b0445166e4764d7b337e321c14c25af6ee4d84e65e573f0f4adec0293451f802875de9e16de5801de4c6c235668740a8803f03303ee967fd89447

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    937dd85a704ddad2926c47f9bc92f4c5

    SHA1

    6a9aef8c6e59fd21732bb2cdf127c2c0f1c9d3e1

    SHA256

    e206e8ce43c459c111777a03b5782441fd8473d3ddfc1b83b94d5803615b826f

    SHA512

    e26439b24c4723f2f3f1f705fbc1fc243dad1b723cdb075f25e0d1791ed212dc14c1a6e9bfedbe874ee1dbfadc00e3f87900e8e24a65425b641d5d75e1cf11fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0e3f15664678a10398ab4138fb64b353

    SHA1

    433e3520171740164f39a0f8c9049812886ce9fc

    SHA256

    074db37473c096cbd3ed1009d36dde2ac22f3b2ee8019062ee21c22fd03eb38b

    SHA512

    1368b0453892cce64e3c144bd43e93eaa3bcc4f12d7dd8a695c635af2772efffef7d8cc3f313a3d3b449586600b39cba0beef8614f237dd6a0e84ee26d387364

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    568e135d32a73acbece9c224043fbc48

    SHA1

    0a721fb2d51a2c0b9dd2fd55a62c712843cf79c6

    SHA256

    6d1fcb52c39cc49ac86819e0697b0fa668301a93912d961dc5b10ab013d1dd3c

    SHA512

    f0b046032cebd2b06fb8ed133abafbdcb34dd59af7f5cb930631d3c67f0871a802e851762b00fa8746115357cde61de6b8b3cca196ac37c91213338b954c72ec

  • C:\Users\Admin\AppData\Local\Temp\CabD77D.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarD8A9.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27