Analysis

  • max time kernel
    127s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/08/2023, 01:43

General

  • Target

    Geometry Dash/Resources/Skull_w_01.xml

  • Size

    2KB

  • MD5

    a89988f0a456c1d1892d9bee7615fef6

  • SHA1

    a21f2bb3d48719b7d760f8e36bd30ed2bbf29b62

  • SHA256

    32efa112a870ce51fd26561e2d37c76ef847bd034af3b67adcad61b1d6ade114

  • SHA512

    3f27b08acda13f2f1f59e56de4ec0822b77b8e3724cd4533fb0f34ece34499ffefe73fd66c57ea475768a14907dfe7a30411dc3f9a112e2151a8caa8764d5a3a

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Geometry Dash\Resources\Skull_w_01.xml"
    1⤵
      PID:1480
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 1480 -s 448
        2⤵
        • Program crash
        PID:648
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -pss -s 408 -p 1480 -ip 1480
      1⤵
        PID:3920

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1480-133-0x00007FFA9BA30000-0x00007FFA9BA40000-memory.dmp

        Filesize

        64KB

      • memory/1480-134-0x00007FFADB9B0000-0x00007FFADBBA5000-memory.dmp

        Filesize

        2.0MB

      • memory/1480-135-0x00007FFADB9B0000-0x00007FFADBBA5000-memory.dmp

        Filesize

        2.0MB

      • memory/1480-136-0x00007FFAD9730000-0x00007FFAD99F9000-memory.dmp

        Filesize

        2.8MB

      • memory/1480-137-0x00007FFA9BA30000-0x00007FFA9BA40000-memory.dmp

        Filesize

        64KB

      • memory/1480-138-0x00007FFADB9B0000-0x00007FFADBBA5000-memory.dmp

        Filesize

        2.0MB