Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 11:37
Static task
static1
Behavioral task
behavioral1
Sample
game/gameee.py
Resource
win7-20240220-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
game/gameee.py
Resource
win10v2004-20240419-en
3 signatures
150 seconds
General
-
Target
game/gameee.py
-
Size
12KB
-
MD5
1631c37e00837455cec510b19bb395f0
-
SHA1
5da82b8df4cae0bf3c2a05322848e085972fa705
-
SHA256
27733e54b6a7288b34b250be3d782b36f333395ea095e80418f486d7fdde8244
-
SHA512
692d76cd3e6779be0256a34c487cacc9e703524359bfdab1bb23da90df34147c1b6264198559ef52fe91276c3d613b9d59a22daf775b52c638b3b233e2cb0bd7
-
SSDEEP
384:KVl1yITA3mKmHiRFIhGTvEBam114mN0xgQRFfUvFaKovEi4Xnrh:IfA3mKmHRes8mN+4MKoB49
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2592 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2592 2368 cmd.exe 29 PID 2368 wrote to memory of 2592 2368 cmd.exe 29 PID 2368 wrote to memory of 2592 2368 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\game\gameee.py1⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\game\gameee.py2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2592
-