Analysis

  • max time kernel
    123s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    30-05-2024 17:24

General

  • Target

    gasai_cracked/misc/Geolilte.mmdb

  • Size

    59.4MB

  • MD5

    254c9b3ba048a2bdd0944397b96fb212

  • SHA1

    ad29f9c51fe8c851e36c264cabcd38483481eb62

  • SHA256

    f163a2f9e374b0562d118d7765f0545aedf28591420197bbbf1354a183b78da8

  • SHA512

    45b0313ed786a90997a39e6d172e9234630ae9acd55663d14eb7c4c123d1f58885124a667bbd02dd023aac7ed34d3ec0c719689dc7b28bbeca4f68fafff6561d

  • SSDEEP

    786432:fggNlnQjvEhnHxoRENfQplsxdQ68/px5KvN/:qvExR/pQ/IdQ6cn4

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\gasai_cracked\misc\Geolilte.mmdb
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1624
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\gasai_cracked\misc\Geolilte.mmdb
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2508
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\gasai_cracked\misc\Geolilte.mmdb"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    504089048d8394286c7279cb154d2bb2

    SHA1

    b3362e6f7af8add5c7f4b1569f3b477a975c618e

    SHA256

    54ef0a10bb105a3109f450091af7e570d86d595ebd0d71938dd5aba1cb4f4b53

    SHA512

    5fe638c93a39751882ff381ae3700643c457ed328a480ec6e9982857a87de069a08156d0efc6ec818cffce4d52c0a767a195f9a57474b3daa6a624bc89ed5987