Overview
overview
3Static
static
3SCriptHook...73.zip
windows7-x64
1SCriptHook...73.zip
windows10-2004-x64
1SMPCScript...er.exe
windows7-x64
1SMPCScript...er.exe
windows10-2004-x64
1ScriptHookSMPC.dll
windows7-x64
3ScriptHookSMPC.dll
windows10-2004-x64
3ScriptHookSMPC.ini
windows7-x64
1ScriptHookSMPC.ini
windows10-2004-x64
1ScriptHookSMPC.log
windows7-x64
1ScriptHookSMPC.log
windows10-2004-x64
1ScriptHookSMPC.ttf
windows7-x64
3ScriptHookSMPC.ttf
windows10-2004-x64
3Analysis
-
max time kernel
128s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2023, 13:03
Static task
static1
Behavioral task
behavioral1
Sample
SCriptHookSMPC v1.0.2-1288-v1-0-2-1668741173.zip
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
SCriptHookSMPC v1.0.2-1288-v1-0-2-1668741173.zip
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
SMPCScriptHookLauncher.exe
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
SMPCScriptHookLauncher.exe
Resource
win10v2004-20230824-en
Behavioral task
behavioral5
Sample
ScriptHookSMPC.dll
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
ScriptHookSMPC.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
ScriptHookSMPC.ini
Resource
win7-20230712-en
Behavioral task
behavioral8
Sample
ScriptHookSMPC.ini
Resource
win10v2004-20230703-en
Behavioral task
behavioral9
Sample
ScriptHookSMPC.log
Resource
win7-20230712-en
Behavioral task
behavioral10
Sample
ScriptHookSMPC.log
Resource
win10v2004-20230824-en
Behavioral task
behavioral11
Sample
ScriptHookSMPC.ttf
Resource
win7-20230712-en
Behavioral task
behavioral12
Sample
ScriptHookSMPC.ttf
Resource
win10v2004-20230703-en
General
-
Target
ScriptHookSMPC.ttf
-
Size
473KB
-
MD5
bafc913eb8cf3b14dae9dbfff5791ced
-
SHA1
9ec2f8b9ae685e6b7e6a54dd929f287682d15cef
-
SHA256
3a98b9b3f7f2dc2653ec51b154b656230a284e203c863016db928958ad949d6c
-
SHA512
dd31599444cb600bbe76a26abdd3917ae2ef9091fe381509502044ed3afa85832ff5488d8f104200843e83fb9e53b66fe2357e75afc4b4311f8ddada370a9a14
-
SSDEEP
6144:JUbJEhd3G/uZI1nnDTMi4Xx8sQB+8tJzHsrXKneBhzXsxpLp/IPSEA3OJsNUseLu:uvQGPmcx3mFkp0VLYlgxhEp
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\Local Settings cmd.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1332 wrote to memory of 4880 1332 cmd.exe 84 PID 1332 wrote to memory of 4880 1332 cmd.exe 84
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ScriptHookSMPC.ttf1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\System32\fontview.exe"C:\Windows\System32\fontview.exe" C:\Users\Admin\AppData\Local\Temp\ScriptHookSMPC.ttf2⤵PID:4880
-