Analysis
-
max time kernel
5s -
max time network
1s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 14:29
Static task
static1
Behavioral task
behavioral1
Sample
gta 6 source code.exe
Resource
win7-20231215-en
General
-
Target
gta 6 source code.exe
-
Size
326KB
-
MD5
a1b15c40f301f8874ac5470818ba4691
-
SHA1
27962aeefce78d00b68d1daa67a4826fda1383ef
-
SHA256
a130a0322291a0b968b2bc056bbbf9407c769f356f4150b47acadbedd190c70d
-
SHA512
f958a8626e9cef545d6eaeaa32b23e0d29002c2c287d08e37b42bc5417bcc21fa5a0e0b1a088aa49d8887a7ab89164ae58523dc21cf3c9693b04eb0e1bbc7f43
-
SSDEEP
3072:Dn2Af+SLiJO+Y7mR9USl6yOiGB3PSQQivLXdn+mvo+vuChrZtwkYZBwOepe4PUeo:SE+yclwQKjdn+WPtYVJIoBfv2X+tWQZ
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2636 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main gta 6 source code.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2636 taskkill.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2052 gta 6 source code.exe 2052 gta 6 source code.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2788 2052 gta 6 source code.exe 28 PID 2052 wrote to memory of 2788 2052 gta 6 source code.exe 28 PID 2052 wrote to memory of 2788 2052 gta 6 source code.exe 28 PID 2052 wrote to memory of 2788 2052 gta 6 source code.exe 28 PID 2788 wrote to memory of 2636 2788 cmd.exe 30 PID 2788 wrote to memory of 2636 2788 cmd.exe 30 PID 2788 wrote to memory of 2636 2788 cmd.exe 30 PID 2788 wrote to memory of 2636 2788 cmd.exe 30 PID 2788 wrote to memory of 2656 2788 cmd.exe 32 PID 2788 wrote to memory of 2656 2788 cmd.exe 32 PID 2788 wrote to memory of 2656 2788 cmd.exe 32 PID 2788 wrote to memory of 2656 2788 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\gta 6 source code.exe"C:\Users\Admin\AppData\Local\Temp\gta 6 source code.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\gta.bat" /gta.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell wininit3⤵PID:2656
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
273B
MD5833136b1b7375db399921f8d1d990e4f
SHA10bb86dd885f6682f30bef4cd5467cdb826ad5cef
SHA256c943cb017f9539f71fd1a777fc10e0958107a2e693e0cccc54f3575accb84a48
SHA512d0346c7662632d65d20b548b6a138dd6d7835507a20fe19eec92e18936a852b0c275dc4554dbaf838b34570109ce9e6841f30e070a81510861d9f0255857fd04