Analysis
-
max time kernel
983s -
max time network
1822s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
06/03/2024, 19:59
Static task
static1
Behavioral task
behavioral1
Sample
Geometry Dash by Igruha.rar
Resource
win10-20240221-en
Behavioral task
behavioral2
Sample
Geometry Dash by Igruha.rar
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Geometry Dash by Igruha.rar
Resource
win11-20240221-en
General
-
Target
Geometry Dash by Igruha.rar
-
Size
303.5MB
-
MD5
23770376ad573ba6828b9f95cb500507
-
SHA1
93fb56ffa8260734d29879bd2e01bf5a135d8079
-
SHA256
97867331bda59a1777f765b7e5ba8cea057157ac262934a796f85a40edb02c98
-
SHA512
b815c27af6bec40ccd1815f9fac8037d17ea497e00fc8aad6d7eca3b068591f7b709386dd1f5373d397fe2d138a10b1df125d8da87ff5baeb7fb640355373df7
-
SSDEEP
6291456:/tWOKdQstHNeSLT+Tqghi3rGFzkmTt/wwoAwtYuDYTbIY:/t2dpeibQkmTpwJhGb
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3360119756-166634443-3920521668-1000_Classes\Local Settings cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 1364 7zFM.exe Token: 35 1364 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1364 7zFM.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2316 wrote to memory of 1364 2316 cmd.exe 74 PID 2316 wrote to memory of 1364 2316 cmd.exe 74
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Geometry Dash by Igruha.rar"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Geometry Dash by Igruha.rar"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1364
-