Analysis

  • max time kernel
    121s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19/03/2024, 15:39

General

  • Target

    DLC/dlc040_trial_of_allegiance/gfx/entities/TOA_meshes_vehicles.gfx

  • Size

    11KB

  • MD5

    b187e83a7f9fc9da3442549f7026ec16

  • SHA1

    ef584a6cb5a846b6aa7a3a0248ad9fbc76eab5ff

  • SHA256

    c26eaabe962a835497711e5734c380527c6467772754c22ff3a6c5bd08f297ef

  • SHA512

    8f29931af4964b3cbe1833bc544093cd5b927b34c91381186eea1d1c4139c651cee2bb25e01dc99780a2c90a9f108b6a701d12bc1d207641870ff2ec178b514f

  • SSDEEP

    192:rvTJvSMQtMY/CAFkn1ejvxYeBvozeHvkv4OvZweGvxne6voYesv4vKovT6eS5x9n:+LJB

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\DLC\dlc040_trial_of_allegiance\gfx\entities\TOA_meshes_vehicles.gfx
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2584
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\DLC\dlc040_trial_of_allegiance\gfx\entities\TOA_meshes_vehicles.gfx
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2408
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\DLC\dlc040_trial_of_allegiance\gfx\entities\TOA_meshes_vehicles.gfx"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2988

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

          Filesize

          3KB

          MD5

          bd1ee2a043c8d60069015f2be5a98f8f

          SHA1

          13850ddfb09a36109c2ca6c077b954f763009515

          SHA256

          b838b57390844692a7a0ab1306f676c21ffb84ade519ef3f6fd6e81310827a2e

          SHA512

          a76ad97604b52ad09481797ddadfa2a258b4504813b3523ebdee105584a94dead7605ce41084c079b6dc3f48b5c0966a737acb5a344c8d6d22dfc36e1c446836