Analysis

  • max time kernel
    110s
  • max time network
    166s
  • platform
    windows10-1703_x64
  • resource
    win10-20230915-en
  • resource tags

    arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19/09/2023, 18:38

General

  • Target

    Geometry Dash/Resources/trailEffect.xml

  • Size

    2KB

  • MD5

    d1071bd12eba2f668474950b17056c0c

  • SHA1

    ce8bfc6875f3b98b36f5100bc6be6ff89e4f194f

  • SHA256

    07a28b7f74882773e7e0d3c96f470d0be3347cca777bc11f0859627e8ba7d53f

  • SHA512

    f796b0ec322cfec72b00bb01ae75d0669d76a213a5c6df62ebdc040a0fa491dcd766a6608bb69601b5d484c856f230ba667627c397b16412b2c32d9040ae2f8c

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 52 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Geometry Dash\Resources\trailEffect.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3256
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Geometry Dash\Resources\trailEffect.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4784
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4784 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    16d0bb65586872db62ee46480d9d2fba

    SHA1

    a3af568912c45dbc42fba128072227d705f2e10f

    SHA256

    32ec593933a2d2f71bb2317b97a3fc722731bbcf4d105c826e5d32c3ad4228c3

    SHA512

    042afb0bc200a6a45fa33422345fb11f34355d5d3edc548f123d787136b2027a21a139ae0a3061f2fad2394d1cbf1a8c297fce277495a46b59e6b6dcbfd5a67a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    6cb0eb920ee303a75369bfa09016ffbe

    SHA1

    6e030478a3d9e22e996b5eaa78ee223b0abaf858

    SHA256

    de61b039e1d76ed8e8cc866d4dfdb902c9a5b13c5c30c908739d369229d3acbe

    SHA512

    e8c0fa37fd2574a25a4df2048e98139a86c5405fbad7f6198d052a24e970a63d29507b6ab632825fa2992220944b9c7171bb06f28a9c4c18d9f7431928758d64

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\DP57REOA\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\DHLBJXK2.cookie

    Filesize

    608B

    MD5

    85f0f602d3573fd55f8a6038c5014331

    SHA1

    906aafa4290d42c49619414fffe133d4f942021a

    SHA256

    88435ce546d9f90ec1c71b7d0ffb22f04739dec0215cb0d73303785da8342aa9

    SHA512

    93cc74736e8c9ba11b3e90cd6dfd75a51124853534df7714012501ff7c607c3e31b7ed523a3ed4b11d1dd475b811872d74228fdfdf0a0f9241810999aa0047e1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\METPAAPU.cookie

    Filesize

    607B

    MD5

    78507577fa39309bd6164bab88b7d71a

    SHA1

    b8dad7a86ff1eed708ed0a4495fae7b972dbcea7

    SHA256

    e3c2dfbd5c5ac7c63793f37dfac0cd82d7ea12cac75d61df65b67f6d1e5c7620

    SHA512

    57aee4c84d268751b40e94b1f99be0a2dc0a3857a89b9d2152db66fb24eaac91813aa612c0af73e72270e148c5ff9a9145e00b77379803020dd54d7bf418570d

  • memory/3256-13-0x00007FFA024E0000-0x00007FFA024F0000-memory.dmp

    Filesize

    64KB

  • memory/3256-18-0x00007FFA42450000-0x00007FFA4262B000-memory.dmp

    Filesize

    1.9MB

  • memory/3256-7-0x00007FFA42450000-0x00007FFA4262B000-memory.dmp

    Filesize

    1.9MB

  • memory/3256-8-0x00007FFA42450000-0x00007FFA4262B000-memory.dmp

    Filesize

    1.9MB

  • memory/3256-9-0x00007FFA42450000-0x00007FFA4262B000-memory.dmp

    Filesize

    1.9MB

  • memory/3256-10-0x00007FFA42450000-0x00007FFA4262B000-memory.dmp

    Filesize

    1.9MB

  • memory/3256-11-0x00007FFA42450000-0x00007FFA4262B000-memory.dmp

    Filesize

    1.9MB

  • memory/3256-12-0x00007FFA42450000-0x00007FFA4262B000-memory.dmp

    Filesize

    1.9MB

  • memory/3256-14-0x00007FFA42450000-0x00007FFA4262B000-memory.dmp

    Filesize

    1.9MB

  • memory/3256-1-0x00007FFA42450000-0x00007FFA4262B000-memory.dmp

    Filesize

    1.9MB

  • memory/3256-16-0x00007FFA42450000-0x00007FFA4262B000-memory.dmp

    Filesize

    1.9MB

  • memory/3256-6-0x00007FFA42450000-0x00007FFA4262B000-memory.dmp

    Filesize

    1.9MB

  • memory/3256-19-0x00007FFA024E0000-0x00007FFA024F0000-memory.dmp

    Filesize

    64KB

  • memory/3256-21-0x00007FFA3FB90000-0x00007FFA3FC3E000-memory.dmp

    Filesize

    696KB

  • memory/3256-20-0x00007FFA42450000-0x00007FFA4262B000-memory.dmp

    Filesize

    1.9MB

  • memory/3256-23-0x00007FFA42450000-0x00007FFA4262B000-memory.dmp

    Filesize

    1.9MB

  • memory/3256-22-0x00007FFA3FB90000-0x00007FFA3FC3E000-memory.dmp

    Filesize

    696KB

  • memory/3256-17-0x00007FFA024E0000-0x00007FFA024F0000-memory.dmp

    Filesize

    64KB

  • memory/3256-15-0x00007FFA024E0000-0x00007FFA024F0000-memory.dmp

    Filesize

    64KB

  • memory/3256-5-0x00007FFA024E0000-0x00007FFA024F0000-memory.dmp

    Filesize

    64KB

  • memory/3256-4-0x00007FFA024E0000-0x00007FFA024F0000-memory.dmp

    Filesize

    64KB

  • memory/3256-3-0x00007FFA42450000-0x00007FFA4262B000-memory.dmp

    Filesize

    1.9MB

  • memory/3256-2-0x00007FFA024E0000-0x00007FFA024F0000-memory.dmp

    Filesize

    64KB

  • memory/3256-0-0x00007FFA024E0000-0x00007FFA024F0000-memory.dmp

    Filesize

    64KB