Analysis

  • max time kernel
    134s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    16/08/2023, 01:43

General

  • Target

    Geometry Dash/Resources/DungeonSheet-uhd.xml

  • Size

    2KB

  • MD5

    27ba105952636545dddebc4e8337c7e3

  • SHA1

    ef45e7d19370d3c4a65bca01b60d94339ea009c0

  • SHA256

    4f93ece615eb1f276d22cdd72d873be10a2d4bf90266743e80a1cf5d0dd67291

  • SHA512

    e4dfd2b6ccf4fe0760027e922450d6dea7b820d457acf3bf0b04ee861a40f1169bdeb1b101e007b501ed135c8bf8179e0586e8a011ec33f0f0a37883a29c97c6

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Geometry Dash\Resources\DungeonSheet-uhd.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2892
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2460
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2460 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    569a0975968bbc450073c6f53dd48bda

    SHA1

    a4844c451710235ea4fe92e2458f25255a4998d7

    SHA256

    a4ec31e22ade12a5306fe9cdff2ce2efd9b8d760e1d6bf19975d8178222c587a

    SHA512

    4968a78660596631e61c833cc44a06982e2d0a0a77b77dbb91563e9d7f96f4108495491a51f796a2357d9f512c633fc196b6612d74155b644eb89ea9bb07a964

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4f22b24edf0cba91bcee15f96a29ea8b

    SHA1

    80502d5fb4c1075a403c7553baa11326a33e7df4

    SHA256

    d17eac58b83c9077fe7e1cc78220dc7b07a7734ebb1bb8a68e78c6f844efa0a7

    SHA512

    473fc6b7a46778732aa23d5922e4c86cdd5aa540b8cc427c875ef74fdcda16325adc3818d9dc268e5a84979b785ba60816fceb7b95342926243bea11c52f73e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a2a199e2a2fa996f8578ac0a5408c56e

    SHA1

    0d4c13f28e36e4c85fc11127b30911999d080d36

    SHA256

    416d82878d7443a697f0065cca46865e2001bd9e375fcebba9efc8a032ad0623

    SHA512

    4b566a73bdc4e53438e1ce5ccc7fcf69eed6750399baeb2688f24d4c934d14433ae90a2ec0e03e637b2bc960d9c5e1abf3f914dc12b75becbb2071a533245a94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    addffec92f7a5c64fe7ebe876463e568

    SHA1

    0b4d028cabd32cfb727c97e9ed323bb8fbb45a16

    SHA256

    171720e9c01d2263993438447416855120701de73b3c95dcdba831ef0064a514

    SHA512

    0257fdb37a9c7aaf198f7fea977183faea03e2e17a0666f008c26e2ca543db7680552499d3cecad3e70dd6ef3deb1574c65b21c7e5284e633c2e35927a28deda

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    21eaa3671f55248e20b9013a657b3390

    SHA1

    c99cceefd5cc1546a2e666547746d8bc976987e7

    SHA256

    103f435df16a17615342e15a139e010c8e064ae84ac4aa1a542b0865b029da27

    SHA512

    270d5e6c646091beb02ab7eeb5bbf23345527f9ae8c2611fcbeaa5bae31068fbaa6df8bbc56f8320bbf24112d056a0e54fd6f90e562d5c79833537426789e231

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8e25e34acf4c85e5090fb296e5d69347

    SHA1

    75357a07c01080a9cbc43477751273534d837ca4

    SHA256

    f036c644521cfb8cff9832559530fa0fa93c98f6882314aa70133eeefedb56d2

    SHA512

    03b6ff38ab3469db88259662d3b3349df7e828172c5f73466ac9968f3af2e8ba75f4ba300727862759367707c2c3a053400be811b1ac4b4ed8afef031b47e1e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0b794c349376feacfb044b3c2e52215a

    SHA1

    17cbfc7757c5764febd9ba81a3771b08366eb818

    SHA256

    65c8385d33851fc6476944f09e362134bbd6cf2deb0a0419520d969a3c9046d2

    SHA512

    d09b821461d4cfcf1dd92def44ee7bdd17b5b6eadb6086c528a698432ce4e4c3b72b44b2c25f1e3e161b464e68ea4b9ef9b8092444f9536e10c377b05b224a11

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0b794c349376feacfb044b3c2e52215a

    SHA1

    17cbfc7757c5764febd9ba81a3771b08366eb818

    SHA256

    65c8385d33851fc6476944f09e362134bbd6cf2deb0a0419520d969a3c9046d2

    SHA512

    d09b821461d4cfcf1dd92def44ee7bdd17b5b6eadb6086c528a698432ce4e4c3b72b44b2c25f1e3e161b464e68ea4b9ef9b8092444f9536e10c377b05b224a11

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c2e105cf564932ef059d5e4b0b59fede

    SHA1

    311ccde62bb8572daf8131d2f8b8b7512431e717

    SHA256

    5b835d13fcc188a80e38c102262a14c031c6f900a187c3a57799183d46f94eb5

    SHA512

    84e88db1bf05828c7423bc2d17a8cacc82c61fa7d722039a108f24ab90308020cfb3c1377ee600f92d37d6fd20e601bbc071522d0826688fdb7710d1e95828e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    752d52916a9dfa1305c09d20ef045af3

    SHA1

    c6fc99ea34b833a12df6475442d05492bf1cbd78

    SHA256

    9f1750bb9c110850988edf35c95e188016c4d4f2a8ce9333e9460fa1aa954f2e

    SHA512

    f2278a61a20a0da9030577b28df07b0ce3a4583afe6caa87fbc8f231b205b488bf008965ffe0aa29d8729b8f6dc607430accc156718ab957105f64b1bfba6552

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    796bece83cbe121b6b48acbf7095e71b

    SHA1

    eda8a5f03de51af3e64922c91fcb03dd2308fa2b

    SHA256

    5f7b74ff4a4f9aa065c436cb7abfd34748db1bfeabb823d691a64f53b1a3bb35

    SHA512

    c6597f42a4845ae663c9a7694b07d63951686af8cbfcdf5d6b294a6b85f9b153a05580dd3993f59f44814077413c50d46e39735530df022df84603d04332de89

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    62b848e608451cb47897803b9d6867b0

    SHA1

    10302e3d138c6c76a9613d4eaa41eb3e95e3fce0

    SHA256

    a404ac4be642a5e31bf82d89409476b75494566e8a33f927b781e737a5cad885

    SHA512

    dc166a8e69a6bbf45bb9605212bd0c64402887111e01efd1e8ba62d172092b964445846a01549dc5aa8396a068a9e287d803238c43ce3769709a0965cc079df9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a34907ff1ec627454717660ecfd502b5

    SHA1

    567c63919639fe3c58295178fcb712c7411246b7

    SHA256

    0d07cd15623609e2ec869174637cfe840feb4c20834fd386bcb663088dcb291b

    SHA512

    86b66fce5d4904a14569b3c8c37d99fe4bd85e63cb419534ca0f651843eae22148538f85fadc1241ebe3bda60ce0e4b01d7b5d9e3e9058f2432de7043e760eaf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c660db16c378084fdd264e57238ff498

    SHA1

    7fb62bcb05e3528596d280e373012eddb75d67a5

    SHA256

    02091dc97bffaceb0b50ef88bfb8fe334a872275750a935331401bc1d1dabe3b

    SHA512

    591ac2522d4ea7e310f22cfc93a739ce99be2ddc4f16d98864e49d3341ec363d6d6c0b8251dbff9aeb099c194af1dd035085ed911b97c6c01237c8669dcf260e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    60b921bfe60d1c4679dc078f185b3099

    SHA1

    07bbf608ed827dd8ce1a7a3993839f524b498831

    SHA256

    141e3eef91342c1fcc9782d43c6b1ca8ebb9c248cd2b07ac475c692f51e07a0b

    SHA512

    4978d2881465d67622b340150ce46ff998aaf653892ecb97890884ae74d504c90869658e08927d3cdd25452ab073db19a04794362f13f766f61e2efdec2fa546

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3cdce34639ff58c66a9b2b89a3cb7182

    SHA1

    352c77d5f0778face5f9e3850fa9c2b728eee8f2

    SHA256

    1c7a301621c8621695671b47551cc87ddc0e9b7f92db958973d1754d5b206a21

    SHA512

    ed2a31070212aa778c4f289f9a9af9192b037b88aebfc7277109e8bd91a6c947df9653632a05bc8c69d49a3d3fae75a744d90382463783b8283cd3e7f39a5f89

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    168dad1a5f8fce6dd684a0ce0618a381

    SHA1

    f460d86284f9ed7c28b303eb2e266ff7932e2e82

    SHA256

    17cd1ed3d234ed1755b4d565ee9f5a752171cf75e523da87f1f16918cded3bb8

    SHA512

    2c520376ac6d5bd88c8f6b76525171a9de03e023b7516340d343031e9e84fe8dace70fc6802df7153d4f6f3c724bd3513e7391ddd93c72f8ee668129f24f71aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    57bcb267dd9e3b3119f3f4c9ccec9a51

    SHA1

    f1c884a2b2e90045ca6a6ae979ae663455a80a80

    SHA256

    15df2407f479983e484f2acbc0b79256cdf6ccaad5e87293333f279a97567ff4

    SHA512

    47b4458d421f21d06d7901efe11bc7691d0b958077886db8ea72fd947a2e2181f0f61a3c0dd32e63d9db65fec357bbef167de40e4d1a82355b87e49014f8f37e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    043a42de5ee923c33c79ea1109000eff

    SHA1

    c679decbfefa2fe57751ab6afcf6257a7ff9a88b

    SHA256

    9334833e1aef2ef331d3797a9199c7bbd45cb8ec727fa0bff333fc19c73a236e

    SHA512

    9215554f3bf874d6511a4cc90625ccb31e802b3601787dd3efff70ad9dccf49436734c8c24d1b36d625457adbcf20eb5a95dc605e66110a557820686a31b26f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5395d323210c8f919d3063804783574b

    SHA1

    ada0a39a3c6f1edc4b68f89fa3785b04c89c988b

    SHA256

    4aa4bfd6491163f3c311f17650b694367dd4b661098042f600f3f72120edb03e

    SHA512

    a19d351503eaf865dd2f7705241407899032be5d2ef2fb12ef9e60542944baf605ed0c980f1f1565fee538bb7fa049d71b5b5821a76d20fe640a4bfe950e2009

  • C:\Users\Admin\AppData\Local\Temp\CabDC2F.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarDCCE.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27