Analysis

  • max time kernel
    146s
  • max time network
    161s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    16/08/2023, 01:43

General

  • Target

    Geometry Dash/Resources/LoadData.xml

  • Size

    40KB

  • MD5

    8bcf15023c1808f5de87ede95b339989

  • SHA1

    6c76fd2310e6837d41b685e424af4dfc83457f72

  • SHA256

    2ce332090435b4145929c12acda2e32373e88bad3c87b978a6ab07dff737da61

  • SHA512

    a7224fb333a1d2895fd30fc4decac728e2bee3dcda4af8b45c2440efd647e048c964ae6e8dc73bdbf7ea7416add94611d4c063972737c3f36675848ab9b13849

  • SSDEEP

    768:MY1cGm9YRslsj6a/yUPp2flDcRXBZLbxZyvN2sF4hsZ/8SyJvcO3Sr1m6AXS:T1cBYNGaQtARXvvxZyvNFDZAvd3S12S

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Geometry Dash\Resources\LoadData.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2804
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2316
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2436
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2436 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d9c238f484e24cf0ccd60bdd8654243d

    SHA1

    54dda0805d29ebe75151cebb0f1115d2730adcd7

    SHA256

    008926d841a2dccaa6601b0cfada32de9b8182c9c1976b857cf4c607006b442b

    SHA512

    3768f50125b340541fc1e0e47539d4660cfb7691ce47f3de1bb796ff6d8a51e3710ad55ff70ce41686985cee5dd54b88f4e90a4e34db474a5278bb113c4c7762

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d4c6ccf8a2c45111f1f2da3e291af2d8

    SHA1

    8b6111494e74792b1cc948d20afe7580ff4ca806

    SHA256

    c50e2bf5c35c8b7224a556ed90064d7e14f9ff7add3fe4201096135bb24ec409

    SHA512

    5598e88b099521d47c4a45cde3589984dc76c41dd0145507d207001b1ff3c3936a65360f71d2f3980c75ecccdd6ec6c1a88272070a73f198c69c799b90abd4db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7c554b2398eefc8437615c9959272358

    SHA1

    311074807bc3b6548a3a92c72acbf99c8f5f2654

    SHA256

    879b83cbe5c331359536ef9c5b7e96864916c72d62267e02d29afd4534bef9b7

    SHA512

    acf3cb3d2e0aaa03d03e8561dd0155146610df6b50f56b29ca7867a01414366b3182336ae5c586f83f0b80d2fd2004a56cadfc91794bbcb73f0f3a960daed513

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    56918f4fa64b8450ee1ce826680a44c8

    SHA1

    7d80fa97f2190995eee1e68747bae1e182638ed7

    SHA256

    ee4bf1d1bb924eebaa2e704f0fa51d40fc8f1bff6af8588368cdcf4f7a6a3aa2

    SHA512

    ab96ef3a70bfaf02085faac9a9eaa6c35834b27f8a7dc7d7bd6678992c1f1432a4dd95c5a2d3b8a9ad0e42b7cba955c76e4be7eb93f9bedaac3676e79a0414dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f6e510491954be37051dccc562a693b9

    SHA1

    2ce983fd31bccea0e60c2c8137aed533462464da

    SHA256

    98d7acc9d307d4e2f2e849d10cd6252f4adaa8512d59023f4f75571cdf4b2fb8

    SHA512

    df22420f9cd619e7070ada21249265fc4a0a0616dc7c322bddc8db3b2fa96791681a54a4abb8cef3c3d0fda5b305e92e4c41a9f80d2296023f90947ad895e1c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    221636981ee8d23788f1beaede7fab83

    SHA1

    1358ba9457f223d2484f6414f3813aaac019a346

    SHA256

    25e91a22452420472059ab7613d751d6491641ea7f25b28144eb56f22966d211

    SHA512

    ae0c22f2d6d03537fb27450263a233e5e940b9115d8f417f357e0041a1a54ec715407dc3ee7d221b3635278a21c3853c7f62f0ed693023fd5b11c674458931f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b3bca2ca6c92dd14502ffc1ce7eb8fa7

    SHA1

    970e293ce66241aab4d4627cb1a5a48db3fcac85

    SHA256

    854218a15a0e0276a81e5d8a255592273f3a568e12878e40078fb6a39159ea61

    SHA512

    648ec1d783a62d45dbd845c565e2d043caba97ac94f77014815f3c9bfc7fc028132e4b9c6e6f3b21669fde01cb8e488a66445f72eb37114e571000cc60038e3e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cd2ac45134884c47a8cd15302213777f

    SHA1

    5e027bc4c1e3a6e8b19e2f13d54029c14c2b415c

    SHA256

    335ddcf60ee7c2ea518ee610846861685016dc0913e6f5909605b5bb5ee046e2

    SHA512

    c42c972116eef1ed2f592acc62dfc6e5413d459a7b31b3af4442e660d3b438c7b33a935e04903adbc2741f8147aceb934b628f7c54ae02969049a0cfef4ee1ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    86f6f363c44ac91d288eec7d5285790e

    SHA1

    63e004a31c0c3eeebd711022f8b4d0cb9991df7f

    SHA256

    058f0de7362939da01918de5a51eff2d87363647cf579311c8cee5b7197bca8b

    SHA512

    c9a0a738cb53e40186245f22fb237a68abaf31fe5f547d3e9dfe17c4f111e848940508c598d236421b37c5330d08ec8943e30cfd422554404b1b6dd3042fe422

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    57820e19e637c5699973d28554b2a5fe

    SHA1

    217288fa7d811cced7750d6589cb8402d8d83170

    SHA256

    beebc4c914640eb2c6fa3b8f123df2555f79ddd741d499375238ab2e0f0b8dc1

    SHA512

    17695a97b29aa7285ac9a5e810a6efff6309b85f34bda4fc67f2353b32ed365a25f4471d4f051234d7aed9e5c175ea328c32f54b1b2ba3df4a1037cdc2ee028b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c01e27a2293e05381c816fddfc7e9c1a

    SHA1

    8bd699deb6b0851d8b0b941bc773d27ebfb702e7

    SHA256

    fae05a0872238a8f816db5dce00d851b9ed13e9f23a6e866bc1d3857976148d1

    SHA512

    8528d4d9edc8058820718d4b65a74f8a0acb5eecdae2eeb7cce4ee20f9be60f6c663825ce348a361fb7612edf5c0e75ecbbaa67d281334203188f02c4ba51cf1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2cd84ce80abc4fc05ef2b01d3fab33f8

    SHA1

    b2a7496cd49c650129e45e0f684d4c6d17999049

    SHA256

    257a91e6b48e69e0dad3269481693129dae838f7c149e9f6e9bcdad3ce6f8c52

    SHA512

    a7bd47c187ca8e806c54a81017d4bc5c6b77f5407f98f07cdde961549373fa9e53306120f6e9e3b2deecb09340d6da98696467ae8e79814ec7e23450e19be1da

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    100fba0e5a7810d4d0581378e8238758

    SHA1

    239fb5217b20d16b36ec1399ce750139beda8185

    SHA256

    402b8267d29e532807ea532736a6e65f21f9524a6fe01316519aa2deefd00343

    SHA512

    102aacefdfb2d5af9f0d4ce7c8528cf9cd55f643353f093bb843786337191c3acff67c1e3ba63e3ce9efa1e9ab2966c73162fd9e59a29ea37ed127bbacc4f081

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4c7dc8ceb42e4592c90393ebc58df31c

    SHA1

    64173d7396775e48ba0ad2ee0ad5e4ef68e9b53a

    SHA256

    e5f0db53c40f1af0e3b0d95e71457dc846529811f69adb0e4cf5703975d7ea69

    SHA512

    94f6f771b05ea5b80b51aa7f3dd051b60e8ba9445df828d35bbf48d549120c811eaf5282c71ae17f770bf56bd98b0e1f309bd17871843c3261650e0518970d0a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0a5b21d44898fe25dfffdfa8563e6b51

    SHA1

    ca7a36561bce94f14836fe61b407ee6991643695

    SHA256

    6ee7a169fe1a9bb01ba230f460588bd29043cf8a4c634455bce3eb33ed94f842

    SHA512

    6cd9093f979f22819fbf2b6a0e7b8996b96495d175ecf73385f942fef481be54a88bdbf71a4f54c7d1bab17c6961979deed8ecb1e8a57e5bb5f4de20b5fb90c6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a051cb36089efeb011bfff1e2af1890e

    SHA1

    9fb62683a003bcacb156859e761c284efda47957

    SHA256

    c6cb5b097ac4d44bb395c79b40ff9fa12562d536fcb3e17b54714362fe729336

    SHA512

    878916520291b7cc2c543a12ae3b3231664f8cd74bc473a87034f87ff2807faa07027a7072b18415a89303d76cd893b8cf105b6fc0954b506ab327acf8bcba39

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6b61cb90e230846972ad0fc15b60bd90

    SHA1

    96910882a4d193145743892bd668662711554d5e

    SHA256

    59730cdbbb7d67f4e9e8c37762a503c340cf940ed318b3d7b7f848dc7f15a7a1

    SHA512

    f1c594ebdafcbd65b65054a478b7fafea441bf2450d51a2509d9ef576a73283c6818c7cccb0d91b40be329abe6fd54130220324936db67786944c685fe3438db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    73343f3448464284330651df9ad28450

    SHA1

    d5b9bde2acd2df5f585f1c4307eb23ea1ba1db06

    SHA256

    c143f31bc06c1496c3b1e43f61643eda5f7f80ce5e51d44bed0e301056fcc2f6

    SHA512

    71af052f3e3e53c94f81cf93ca43c434b51e374467970efa7c353475d2aaff0c9cdfdb63e942ef055746d5fe9793e0b6c2f58f3888c2d17b7d09f03ee2913b49

  • C:\Users\Admin\AppData\Local\Temp\CabF94F.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarFB84.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27