Analysis

  • max time kernel
    109s
  • max time network
    167s
  • platform
    windows10-1703_x64
  • resource
    win10-20230915-en
  • resource tags

    arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19/09/2023, 18:38

General

  • Target

    Geometry Dash/Resources/stoneHit.xml

  • Size

    2KB

  • MD5

    e3a4026b370dfa7c5cc5075162033a14

  • SHA1

    d3aa2fe4b23576ab9a8b3bc98f6791ee8f92a08e

  • SHA256

    24dffcf657bb086c7ae5eeb8a84bfc3db981356f7690360bfb0a64d55ef313d2

  • SHA512

    c0eec0f6d866d35879f416957c18b568aad4408522d0ed6ef8b9064039768af86d9d082b670baa83400b1b67940755913de2a90d8b225183eb762036c6a5b2f4

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 52 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Geometry Dash\Resources\stoneHit.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5044
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Geometry Dash\Resources\stoneHit.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2932
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2932 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4496

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    16d0bb65586872db62ee46480d9d2fba

    SHA1

    a3af568912c45dbc42fba128072227d705f2e10f

    SHA256

    32ec593933a2d2f71bb2317b97a3fc722731bbcf4d105c826e5d32c3ad4228c3

    SHA512

    042afb0bc200a6a45fa33422345fb11f34355d5d3edc548f123d787136b2027a21a139ae0a3061f2fad2394d1cbf1a8c297fce277495a46b59e6b6dcbfd5a67a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    37a99beecd046c45a748e7871dd8558f

    SHA1

    2bfdd227d67ce132a66915a90a195ded12bb246b

    SHA256

    2561e7e651966598ec9335912c0a22527fe4a254662f8dde2ddea74a9fde1ba1

    SHA512

    a3c20a10cbc1873d75bc0cba73824029efa7e809e065eecfb8d7b45880e29d2f87ce23134282f9f6504ee010f02bb39819b060e3b861c739db9a36c3cb698a1f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6HNQEMO0\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\7D67Y1KY.cookie

    Filesize

    604B

    MD5

    0138cda8b0a63bea07ee8ce6b5bda8ed

    SHA1

    815939c3217d03fe268ee52bbf6455a315b2f5ff

    SHA256

    263271c56d59d973a3504378bff4fc959916bdc3acc3c74f11c2974c964bba67

    SHA512

    5ec7c9829c9dcc51b36b14775684f05ecc8eb3f58febb5b70ff19450a3e492728762e3cfabdb1d3bcdc90e92cced32495e76f716a18edb28e136fda490e733fa

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\JP1V5T8M.cookie

    Filesize

    605B

    MD5

    8fc7b8c5b605e5afada386e41a7d1b87

    SHA1

    70c11cb40df89013fc4775393ba3e66e3d83d7aa

    SHA256

    2e4fcc8cc0f19c63e9c34694d33c4c508798088328a3581044954ea376ab78c7

    SHA512

    305a9a0de3355497a2f0e210fd738bff3a43268e5b040435cdca4bf761351d772abe848d69534e9d9cc8045a3fa02ce2c8947fb26542f562ed67ae2bb9a2e4fa

  • memory/5044-14-0x00007FFC71D70000-0x00007FFC71E1E000-memory.dmp

    Filesize

    696KB

  • memory/5044-17-0x00007FFC71D70000-0x00007FFC71E1E000-memory.dmp

    Filesize

    696KB

  • memory/5044-7-0x00007FFC72410000-0x00007FFC725EB000-memory.dmp

    Filesize

    1.9MB

  • memory/5044-8-0x00007FFC72410000-0x00007FFC725EB000-memory.dmp

    Filesize

    1.9MB

  • memory/5044-9-0x00007FFC72410000-0x00007FFC725EB000-memory.dmp

    Filesize

    1.9MB

  • memory/5044-10-0x00007FFC72410000-0x00007FFC725EB000-memory.dmp

    Filesize

    1.9MB

  • memory/5044-11-0x00007FFC71D70000-0x00007FFC71E1E000-memory.dmp

    Filesize

    696KB

  • memory/5044-12-0x00007FFC72410000-0x00007FFC725EB000-memory.dmp

    Filesize

    1.9MB

  • memory/5044-13-0x00007FFC324A0000-0x00007FFC324B0000-memory.dmp

    Filesize

    64KB

  • memory/5044-0-0x00007FFC324A0000-0x00007FFC324B0000-memory.dmp

    Filesize

    64KB

  • memory/5044-15-0x00007FFC324A0000-0x00007FFC324B0000-memory.dmp

    Filesize

    64KB

  • memory/5044-6-0x00007FFC324A0000-0x00007FFC324B0000-memory.dmp

    Filesize

    64KB

  • memory/5044-19-0x00007FFC72410000-0x00007FFC725EB000-memory.dmp

    Filesize

    1.9MB

  • memory/5044-18-0x00007FFC324A0000-0x00007FFC324B0000-memory.dmp

    Filesize

    64KB

  • memory/5044-16-0x00007FFC324A0000-0x00007FFC324B0000-memory.dmp

    Filesize

    64KB

  • memory/5044-21-0x00007FFC72410000-0x00007FFC725EB000-memory.dmp

    Filesize

    1.9MB

  • memory/5044-20-0x00007FFC72410000-0x00007FFC725EB000-memory.dmp

    Filesize

    1.9MB

  • memory/5044-22-0x00007FFC72410000-0x00007FFC725EB000-memory.dmp

    Filesize

    1.9MB

  • memory/5044-23-0x00007FFC71D70000-0x00007FFC71E1E000-memory.dmp

    Filesize

    696KB

  • memory/5044-5-0x00007FFC72410000-0x00007FFC725EB000-memory.dmp

    Filesize

    1.9MB

  • memory/5044-4-0x00007FFC324A0000-0x00007FFC324B0000-memory.dmp

    Filesize

    64KB

  • memory/5044-2-0x00007FFC324A0000-0x00007FFC324B0000-memory.dmp

    Filesize

    64KB

  • memory/5044-3-0x00007FFC72410000-0x00007FFC725EB000-memory.dmp

    Filesize

    1.9MB

  • memory/5044-1-0x00007FFC72410000-0x00007FFC725EB000-memory.dmp

    Filesize

    1.9MB