Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    02-02-2024 00:30

General

  • Target

    overrides/config/biomesoplenty/generation.toml

  • Size

    789B

  • MD5

    25a02e117650073e73ab7feb2fe4b68f

  • SHA1

    651dfb5a8a5ab413668939c8887dd350d993ea67

  • SHA256

    ceafcba40efc2aae20e2562e9433497510ab701104a8c4fb842d8c82176ee636

  • SHA512

    52605803eee2b158a91193d3df8670cd579a46813c48bdd89a05d37a34e42d204140a79a2cefc0f60d70655ada3db245a06238693d17e174441259cbc93e3bf8

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\overrides\config\biomesoplenty\generation.toml
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2616
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\overrides\config\biomesoplenty\generation.toml
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\overrides\config\biomesoplenty\generation.toml"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    3644e4f4706adf7307457eb5d949c129

    SHA1

    97ac65143836453933c4e9b5890af4f4e4bad4e9

    SHA256

    b3d91d0c792b330d7fd839ec1d6e5f3e28fa496e89e5350a0befa53868da1ee7

    SHA512

    62103eb947e8a2db1ef1edae0aab6ddcdb0423b09d49a1bbccb69ea969c65362dfc6df030f9ee3387949543c72bcb5c60bf0e2e4188ed618e5922359fc22cefe