Analysis

  • max time kernel
    120s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    18/03/2024, 16:31

General

  • Target

    AutoMax v1.0.5 - Cracked by ElectroHeavenVN/Game/AutoMax_EHVN_Data/il2cpp_data/Resources/mscorlib.dll-resources.dat

  • Size

    329KB

  • MD5

    21d06dbc8af6432b2b49536ed30609af

  • SHA1

    11a1c0e2ab2f8c06fe4507535ed47e0dd279a60d

  • SHA256

    c5baa176a5b72cd545266340e42102d393a5e43d38c95796bc828918bb95277f

  • SHA512

    2971f54eaa14c3ce6e2352e5a1aea5b044f0894bf4eac92de8cd92515b6473b5ca56ebfcad4369a9d4935cbefea2540a83f332fd4d832c37768310e8776ceb5e

  • SSDEEP

    3072:c5j+evAPQ48RhHkXKSmLZsumnWpevI1kMqXkD3by+BEL:crvS8rHXSmJmnjvXkSr

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\AutoMax v1.0.5 - Cracked by ElectroHeavenVN\Game\AutoMax_EHVN_Data\il2cpp_data\Resources\mscorlib.dll-resources.dat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\AutoMax v1.0.5 - Cracked by ElectroHeavenVN\Game\AutoMax_EHVN_Data\il2cpp_data\Resources\mscorlib.dll-resources.dat
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2168
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\AutoMax v1.0.5 - Cracked by ElectroHeavenVN\Game\AutoMax_EHVN_Data\il2cpp_data\Resources\mscorlib.dll-resources.dat"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2708

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

          Filesize

          3KB

          MD5

          494599bbef0d04dabfdc73e8b4a0cd70

          SHA1

          c37dbbf55b320e300568ce1b24038fdbe80f9353

          SHA256

          3d9731a72aee9dff42d58c8ac20562ff05066c25e196fae71ad7609027f076f1

          SHA512

          964ab5224952f5da25311be42a5befd145fa1ce0e532590d696c185dad19a6660d1c5bbe1d632bbc590834f27be351fd50a8214a80883ac1fbf6fd5e108f9317