Analysis

  • max time kernel
    135s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    16/08/2023, 01:43

General

  • Target

    Geometry Dash/Resources/SecretSheet-hd.xml

  • Size

    8KB

  • MD5

    fd1b8ad2c4307a1ff6a6bcf696b327cf

  • SHA1

    491072085cd021ca280485d92e22b5e5bf750251

  • SHA256

    e8ab94b4318da1b011e95cd06700fff9adf1a2bd7e20ab72dde7a2496a581035

  • SHA512

    57460ebec83aa4ccf75dc3b22cc88a469715a995db1b84d8672b1659f6ac7690fa2365cd9a55f6058fa2c23e679768dc026cebe0363b41d31e6b0597fa82faf7

  • SSDEEP

    96:/y+sYkuDXoSYkRvn0cBkYke58JZcYkxd+WpKJYk/NBBQX7Yk/NnHe3Yk8aMK02YM:a80g06LGak+XQ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Geometry Dash\Resources\SecretSheet-hd.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2976
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2984
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2984 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b5002cbd91e5caa9a454ed809cd062b1

    SHA1

    7ec7f78aa03cb434ea6792cef46a19e94ae2b862

    SHA256

    e163e898e55a394129f141a964d8202b4541388078cbf2e008b2ae8906d5dabd

    SHA512

    02154a9cd1c7b58f8b76173c3f51400978f9c41dcafdfcd2ab3ccb6d4a24ccef45300d4d0ec43de209c42f0fb5c4407c8d548709047a3f9a7e4cc77b97d15259

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c678571a57a9c58a8a00e740e4063f24

    SHA1

    a7860602adfb74ae38ad22063d7bc66c663a12ec

    SHA256

    0a872c9b52e215b8be3748888e66aef50df4a39fcf5f02882d93b86f0778c6ae

    SHA512

    621a458f0eda553a9fce08566934c7960b8401a2c513c5dac84be5627476ef825ff258bf8e8eca7b3024a03890619a648e0123e0aed317798e34a92d75c8e28a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2650c8460c8bdb6a47ad05e3c16f8801

    SHA1

    442254d7253fd0a9bfc17fb8c55fd6c64b254e4c

    SHA256

    0fb5545768cce7c565e9a132292f08afea11bb180a399f6be3275a9dbb5a2dcd

    SHA512

    b50680c278e6fbf156f0680b65ab5d03ac7ac44639a75a1e2d7dcb40b0ad0fcd10893e40c98fbfa02a45a10ab9cf4bfd43def3186d02872362cde20b1011340b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f06d3043ea21c66c750feea5e2641b1a

    SHA1

    e618553d0f88fb71c1765e320b688ebdc2413123

    SHA256

    453975c1b89ae7eb2b166ac33028f998fb514a42406202e4799e1ec7f1d73c0b

    SHA512

    8af5fb979ea4710a345844be718e1946ee3cc003aa7dbab9cb9e17be013ff9bc9e4029eff1c23b55afeda1e05d297c1cccbba75b3f270b18b1ccaaf0355f5640

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    90c614c59df2f5b5ab7a3f5cb720f470

    SHA1

    4b2cc58cacad2ca20df0a5ab1505988adc285ec0

    SHA256

    1070a9967dce3bc71c747fe66169993739776546a624927c4a8dba7a039552a7

    SHA512

    3a8564047ce121466188b499448560f389fabdcfeb29508e931144e7a49ddde0ed4403f6ee15893a519f98a01e8cba806dd8483b0c84f0cd23d0741c5ad7a1e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    60976a8a54442af7ee7a76f24317ee7c

    SHA1

    ff4c442baa72d3c245036ce95014721923d1fc30

    SHA256

    4970eae1850eed55769db2c7425ab6d1b8f54fd39a29555a78eca29c78fa12f5

    SHA512

    71d4cb9f5435ab0a41f555b5ea3eecc46867f1fd361b4f0462bae082d9c21444f04288e022b60afdaf080b64b81732d9357c2314936c586d7f497e2d919052ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    98c16ce7e8a3b852837c09add4750578

    SHA1

    2e980643f72617b71eac3ffff85111ed181c2ae3

    SHA256

    80b30bb8970b783c94afbc0892617e523038dff454948b680d184c01af90d02a

    SHA512

    e072be15489d8131896fc460987283a8973dbc0256defeba992e706171e1ae25af9820ac4e3d2f8ba9513cc2801b2dc25f23ce3df406227b6719e1b8f967c7e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1b104672a12b9dc404d99ea0fb5a9463

    SHA1

    efb5b677a01123f22a0e2f887ab51eaf86d4b6f3

    SHA256

    06ee130738133e06892013c3c48c08abc2af923d1f0e1145d3b22e96e36ca427

    SHA512

    f653adac9921f76c11c8e220504dbe16557cacbcd20bb80b10e5becea0d2cade407fe5870600b1b7eef80d5decd2ef3086e73f2bed6a68c36f0a0228a4765a0b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    633a21460bd05c1db2fba42a5cae1557

    SHA1

    87bef7040448f1881bbdcf000d5ab0774bf63ef2

    SHA256

    f3c89cbae24fb0506a3b5c9010a6252e3a3aef94381c6aa6a5759b1cc733ae9d

    SHA512

    cfeaf1d2ebe1ba71882f448dbdc5d2c7d7df9f047f388c779c45fb923750a310e1d807a5389ace8b4cd162f839836420d01530016136ddaf20c4e5288c315f88

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9d07cf7559c1893c3f75d0febec563a4

    SHA1

    371bf6414d5446dc5166d3ed42ad39586119d486

    SHA256

    00bc8d7bcf24a1d53f6f7edc7639d1a50867abbe2a3667889dfcc734c2f43b0f

    SHA512

    393956e8bf09b3f342a0e2989ee8f02dd1439b27bb7411107b39de80548d5bedb8bf6091c0ea262a349cf47c614b2cb6fbfbaeda10672b29edb507c3e560c41b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9cfec99fcc987f72737e17e4e895b125

    SHA1

    c659649940ff0a07f877d0d7f6751f14da033ea6

    SHA256

    5e1553a7d24e3a6c76ddf306214249d5af813669535d2c09d52b2d5bbf0f76f4

    SHA512

    9bfe8a91929442bbabf4d1f25694a2a1a9c3ead7a04b91d6b77c264ffa4143c74e04ea2cec7d32f7d2fdf4633beb0dc23bafcb4f924e3f6dd4fe07094f038719

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6a27a77616bea522a53752efe445aa72

    SHA1

    45ad152fe15b29dac82e33983424c13adfec474a

    SHA256

    42e6746469f2c842df36d1b55f20fc5d88eb7a7e48d97c3ac0e3a12e12d03eda

    SHA512

    45766f688bcb6841cfa275cb5e95447227a0d6cd981e3dd71308e15d3b373e97249e6b3c31d165554a128c900760eb939383ea171fd914409b1060f57131e982

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4e5629cacdfc3921dda16e095f2990e1

    SHA1

    4609ae8d5585dc3cecc182969ec269f8d4abfd4c

    SHA256

    c4fc0bc2331bf55343244f48847abf1cab913c0d279cb6844a740ad7d16c860a

    SHA512

    1c4e93ce31b7943679ab9cb42e2f92fcaaf0440494e423749475b818b0188227700fe32c500382aa2bff90125c36a552a7d7c0f02d603ac34257e2238ca35fd1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d774bc12b84012dfcf78a88b149069bb

    SHA1

    c62245862af9e022ae53d0a40dfcce77d83b9419

    SHA256

    17ebdca7002d63a501232fdba2b32840b038d9e829b5dda15a8a7b05e77350c5

    SHA512

    28ad93226fab9fbc9bd4527cd7ab5659cc28d288ec7347eb8ba6a674f0eea1459da831d700d9a0fa71e4882730e55e8bdb6924b5f001b0e64588a7eabc47efb5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f227687bc86834ec3ef2ee310f50c3b8

    SHA1

    e67fa2c88b3e28a8b7c4f539cc9926ca68ac6e82

    SHA256

    21e811d47dfd4ed7ae7820ebda272dda1bc319da6b566c3eb97c2ce9193bf816

    SHA512

    f09a6e9a756a2aa69811d5761037bd2977f70ca11d6a7ef973c550ea42f2d7a12df603ae4b125a6fe2576192de7445d1e37de9d021a8a4a377fbf87048cbaf61

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    01f04dd3142a973d10090d07e231f8d3

    SHA1

    ae6ea23a436345255f26315c2f6dbfa5701e7c4e

    SHA256

    52b15535839035a4039d7836abee8c545dd101a11315205a721430ea1410e888

    SHA512

    e36f2699ad29d0d60ddde10214582d62e32d7c01f35e38c821fe90789a9a95cbe8e703a1ce1c2f7b4c1da2c23a6512beb34f9f5ba663717ea3c31178ac9ddb08

  • C:\Users\Admin\AppData\Local\Temp\CabE285.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarE324.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27