Analysis

  • max time kernel
    134s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    16/08/2023, 01:43

General

  • Target

    Geometry Dash/Resources/Skull_w_02.xml

  • Size

    2KB

  • MD5

    053bc5334f60e46888df0711dd11f865

  • SHA1

    6e21b8c3af90d9eb75066a4db9d1f1b6f8267092

  • SHA256

    147d4e99c8360276debca1f1f72669f169bc2d0126fbfaf97359a0990cc57a44

  • SHA512

    c817b7cad320d7cd31e0797053466db83a043c38d82c6f4a42853e6294ac4d6b46d92fd95ceee8de8fa30b611844fc40af4d4e87de39202953b645dee5890f1c

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Geometry Dash\Resources\Skull_w_02.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1480
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:272
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1772
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1772 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3ef61040fbe0edf54b06d4b437e72d57

    SHA1

    2ab4f8729e6e4d22c64fbcdeef96061ae53a2863

    SHA256

    bf1f4f9a6dc53ba81772e61c6fc9296d583a9318e9fe7993bd534e114b669e6a

    SHA512

    0d6dc1e8c2a8260792d8b81bb0fe2938de5e2f573312d71f9857309d15e5e43163196c9f50b1c4dc544de8e5620d0c70d2d2a37c0b017e1555343744f2ce0d19

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    64d3ff151be3f3566b5f45862918e682

    SHA1

    32c3751b5fd83d4ff8f3b7c2cbc7dd102e87b7c9

    SHA256

    d7a14624d2c0b96437204770dc5befdc16287332371007f2eb951ba9ccb4e939

    SHA512

    5816bb00a70167f5a3cd357b580923a2129ba24d9284f7cd6125f6e3a79544abab110dcc47bf40a427735201a26fec0379daf97eaecb7a8ae3bf061647eb7f5e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    abbc16a6c0ce96ed3549eaa6951ea3d2

    SHA1

    4a853f30612fa61782242ce4122dc265580c290b

    SHA256

    29f1f394c5d44c1ca590b62a3d09ec81ddf2c38913252a3aa3a3c7a8ccac83cb

    SHA512

    ae8852b824e4d07987c74df094eca2b913f3ddca0664d0e3611afe73deee537b6ab76f85a8a817148cb1c2dc35c2289e49c9335fc4d3cd8c74e088047aeb2bfa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    27a06ce2fba49035b92e4faa0d892062

    SHA1

    554c72365bd7d46a8a5ef737001e0a7214b32708

    SHA256

    16594d78d07ebfbc9a2b8ea29ce9e148374a2911c2c7d7be7685288d0f877bab

    SHA512

    abfd7c2720c84025b231361eb0dba3d1e63f728bdeff18c5e7006248f9dfa71c329beae0975873d53c10e956404d78e4e2639be7c39b22dc2153752b7ba711e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    450cfb7339ac1df50b7143c745548ee4

    SHA1

    7a8f45b22ea445a136653bb264af862d08b265e5

    SHA256

    ec7ee088fe3f1bb7012a56f5e48f76ec700b85fceabcc9b50ae27142622da589

    SHA512

    00f8f4a94cc615c4db3ed480d436295d8a8e3e7a0188e0891adfcd5350b7080f0e430d4ec0916c6a0a8169ede2214bab3a33bbbbc425eeda1b424c87ac521228

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1e9f1d25db83f483316fb2592ca57324

    SHA1

    88b30cee2efe03699177d6e7cd3e210fd0247f02

    SHA256

    b2599918116ec9ee0a14fc636c52acb8a06a7f770fd8f139d414712d987fa0f9

    SHA512

    8e59b945f2b14c517f716498fd5b2ba1ccf9b342baee9b6ab9a567d58842d49d89e7160701067cd4e7082b8511c0357d7927f9ec776964a61cbb2dead6bc7b7a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2527dcd2e7e286bdd7166a28a978cef9

    SHA1

    d2add108239300e9b6a61205865a6da25bf0255e

    SHA256

    b4a128d07e0369469c427491d8d75c08e7e90924bbd9995894227b52757acb6a

    SHA512

    cd00207db2229d164c986a8e8bac360ee30c4ac8b7898be2ade2772042a21bffea9fb80b82c2dbe44a527e1adfca72f1499699ad3474b9fb5af751e6d7ebe192

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    43e8ff366992d24f3feb2c221364a3ea

    SHA1

    a29010a47c33de7f5496d99c213f38ce19750c30

    SHA256

    deb0fd61b4b99b3698ba6b0f0e478c67c94513d674c380a4ff86b08a2d05f170

    SHA512

    260f1df9a998ab43a12d2e592b8c525f92bc852b02b1a5b059c082432510d6a08640d196ac585126b719469af11dc4386ca0f9847eb1df24c4c13c4ec76b2a81

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fccfe0166763c205e9a9e98a53363934

    SHA1

    5a7b4dc1e559184590aa2f3085a2f70b69049eb5

    SHA256

    def11f95ad514c913c06814da1d825d6ffa714471872dc21a29f2fc21cbfbff7

    SHA512

    e22e80755db490437f843219b2fb73258fa6f80717050d2b14d1acb9faf42f3482103014ad97f8b5a7e2be927fc6db66a610189fa279356edd5e7579189c8adb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d565ddd9aa895dce1e0d880212738115

    SHA1

    72727bfbb5986c1c6989d821aedb0327f53e20f0

    SHA256

    8b314497323b42c6cb1ef8c7dc5d7ec5a2ce8196b225c45b525268ded9d17c1e

    SHA512

    52328b33879fa1fea17c28382b8404830d0964901481c36a6a3c0f071c7f724d7a24b68e1433496e0b7b1d35b76a516125f3cf9b68c96b8e1f3f2ff6dcd57f4e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    074394d00dd1bf1a86a4c9afe71cace1

    SHA1

    9e3aa1c98e1294fbe8b16a40019237ed91f4438c

    SHA256

    0491816c6e611aacfc9b204ed3f9ba36d822ff4b62b1619e1839cc3e6beb8d9b

    SHA512

    63c663181da23f71130c497533482ddc218fe294e9b3cdfa59bf1cb1310cf36cb6ed512b43381ee90481040706a743bdb2e38b241c41026d7b83eab3cd0004bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b92bbf2969967379b24fd85547ad7ec5

    SHA1

    f19655ad62d4e4697e5a4e12364b6c6fd636cd50

    SHA256

    c18a660d35c6c911ad7d36cff1acd50c66fd5ca444dae7dbded99b18615f22fb

    SHA512

    65ae3a551a120f331f443764ce883c0e65a65d0c23eef3290d16c198dc2ab9dcc61214012081acf1b26bc829963c795f1ecab3f4521cd80d303d35f23d678d9a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    45ce301241124e8ca1bc41c60e9425e0

    SHA1

    4a284e69f066467e0099545aa4656ef9a30b193a

    SHA256

    01a32af78ce2109e103b4c0b11e1dc47ca0395fb83ca5af050b441a9306d3b5c

    SHA512

    c0ee58b9bdc80483289ff707dec5712ad954d6f74fe9b231ab01f5cda5d0000ad28c842a3a9a56100d5d53c1c49003938dd03ab578ad001aaefd4b796fe2a263

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9a9e0ca30e00b1b0829ba44215808c27

    SHA1

    84a7b79875372f6ada0c903f8d16405dd6829e2a

    SHA256

    643550fbc9241a3fa6f83129cd9fa20aad897bfea35e523a0dc7b8795e6ee686

    SHA512

    92e61dafa6877bc8dfe16a63f3d138324a9482d7c2113d92902e06694f8dc063dd2129e182429f843e9a2be33657c9dd0ad118a23c7b31249246ce3847fc98e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8725fc8e65b57df1b3220cad43243aad

    SHA1

    4b0d29c16f19e489812a7211c6ad85741bef8412

    SHA256

    23436cb907a25570ad5befeae040c8c9f81bb2ad8f8d9ed1ba42c1b48356f876

    SHA512

    6aaa4134519db55d06e6f44e1edee9b1a62706cdb7c866ee1f9ce889dc45539bbf748c64d22279d0318c141ce195de43d57341195ebd116f98703af58d10d6bc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    45336397787d8559f9672ec9c5668ac5

    SHA1

    bac4964fa7597e6071bcc1271dd646929a59548d

    SHA256

    1d7885338994c23775ee6766fb901c48ba9f378076c86bcb42b6d9451e92116b

    SHA512

    401a5fde78946a428945a72791d7c0beed4b95ebd53a76d2e11b8bf6798363aca7a44f245b45436683f5bc1cc6fc28f66573471e4814d661cc0605fc68d6bf2d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    222c8ab3260cd38f26fcf39a77546521

    SHA1

    e55b7913ccff712dc51d2e29284dbf8cec4617d0

    SHA256

    add203e4e7656ce12e44878724b25204730c8ca629c1a5f2f862a815c83d33c8

    SHA512

    2799810aadfae96d6e35af818addf1d1782634be66a4799f9c85e1127f8a4928517453f45228748e5c40e34813e147f0c43ba5a794657ec76399a26061cb0205

  • C:\Users\Admin\AppData\Local\Temp\CabD961.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarD9F1.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27