Analysis

  • max time kernel
    360s
  • max time network
    364s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01/05/2024, 05:46

General

  • Target

    game.lua

  • Size

    10KB

  • MD5

    e205ff3e5ff38c40a3c32f52f8757bf7

  • SHA1

    5edb81d72edd2e7fa920597461283fda8552534a

  • SHA256

    05d0fdfc3ee78850da2b792fd0c88c410ee961c148994fcd503c21eb3f22e9c5

  • SHA512

    47b915d154391dd17b32070842f1299fd492730ef009a8fb51b5c1282b61bf6fe15246121f8df93cd9cdbd542de341dfac4bfc5452cfc9b3c9425a714fe5a3ae

  • SSDEEP

    192:8kOo3X0otBGoEonyOozSo8oVhocipoDYToKNioNdFmoWAos4oeWo0e2K0EMw1i5C:7Oo3EotgoEonyOozSo8oTojpo0ToLoRq

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\game.lua
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\game.lua
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2436
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\game.lua"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2484

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    7a1294797c94783108c4eaec7c8cacf0

    SHA1

    160fb9e8112e34b9da769f45843bfea6652bf956

    SHA256

    1682c602fddb0dfc9275025c2cdbfbdb672027ba136177f9629c7de707110d8d

    SHA512

    01987f529215501201d2440ffe7312377a493f15293263ab0c51bfcba5fa80ac28fbf2cce06ab275f7b31924d7b2bfbf0d4f3fffa36071156e0ff87a99916453