Analysis

  • max time kernel
    144s
  • max time network
    162s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    06/06/2024, 14:36

General

  • Target

    The.Long.Drive.v2023.04.11c/The.Long.Drive.v2023.04.11c/The.Long.Drive.v2023.04.11c/TheLongDrive.exe

  • Size

    638KB

  • MD5

    6cba999b92dff4585016011468ace1fc

  • SHA1

    d4361e2111c25a85dcaa6365f30f1047c2b66dc0

  • SHA256

    578a9c28a9c14b3c9c5b4cdc10ff0b546f8ba0ba14354c46294bad3ca1ecece6

  • SHA512

    fd1206432add9e9fc94c4dd5fe3822e7552b568982941fa3e28b3f901cec6515d9641b42ba658592bb33e1263c8fda6fd511b3ea5a8de0da4d94b5855ad5e60e

  • SSDEEP

    6144:oEbaWnBUCGtpnOckE54xrDq70wE5q4fqe3a2LVJJLx3h5:ooCC8RBiNhNqgd3fLrP3z

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\The.Long.Drive.v2023.04.11c\The.Long.Drive.v2023.04.11c\The.Long.Drive.v2023.04.11c\TheLongDrive.exe
    "C:\Users\Admin\AppData\Local\Temp\The.Long.Drive.v2023.04.11c\The.Long.Drive.v2023.04.11c\The.Long.Drive.v2023.04.11c\TheLongDrive.exe"
    1⤵
    • Checks processor information in registry
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2844
    • C:\Users\Admin\AppData\Local\Temp\The.Long.Drive.v2023.04.11c\The.Long.Drive.v2023.04.11c\The.Long.Drive.v2023.04.11c\UnityCrashHandler64.exe
      "C:\Users\Admin\AppData\Local\Temp\The.Long.Drive.v2023.04.11c\The.Long.Drive.v2023.04.11c\The.Long.Drive.v2023.04.11c\UnityCrashHandler64.exe" --attach 2844 2099237949440
      2⤵
        PID:1080
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x00000000000004BC 0x00000000000004B8
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3316

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Genesz\TheLongDrive\Unity\27d4a29b-cd4a-4dfa-9f97-9276bc4ccbd3\Analytics\ArchivedEvents\171768482300002.88ad8273\g

      Filesize

      1B

      MD5

      c81e728d9d4c2f636f067f89cc14862c

      SHA1

      da4b9237bacccdf19c0760cab7aec4a8359010b0

      SHA256

      d4735e3a265e16eee03f59718b9b5d03019c07d8b6c51f90da3a666eec13ab35

      SHA512

      40b244112641dd78dd4f93b6c9190dd46e0099194d5a44257b7efad6ef9ff4683da1eda0244448cb343aa688f5d3efd7314dafe580ac0bcbf115aeca9e8dc114

    • C:\Users\Admin\AppData\LocalLow\Genesz\TheLongDrive\Unity\27d4a29b-cd4a-4dfa-9f97-9276bc4ccbd3\Analytics\ArchivedEvents\171768482300002.88ad8273\s

      Filesize

      440B

      MD5

      7c034f7ff6f9dac43754816ab08bb2c6

      SHA1

      28e89b9333284d84dd82f2244f48b35f6a0ad523

      SHA256

      911a56267099904a10d887ae8d8aeaef74a85dcb17039d65f30b67ec7950a65b

      SHA512

      12017ec00f51a88767c991c445d06aff5799f97a785a711c0a0dcbd6788069301f65203e6e31d7dfefd552ef7fce831c5ebb65b170fbca43d71fe2a72095d1c9

    • memory/2844-0-0x000001E8C4650000-0x000001E8C4660000-memory.dmp

      Filesize

      64KB

    • memory/2844-1-0x000001E8C4580000-0x000001E8C4590000-memory.dmp

      Filesize

      64KB

    • memory/2844-2-0x00007FFA57C00000-0x00007FFA57C10000-memory.dmp

      Filesize

      64KB

    • memory/2844-3-0x00007FFA57C00000-0x00007FFA57C10000-memory.dmp

      Filesize

      64KB

    • memory/2844-9-0x00007FFA57C00000-0x00007FFA57C10000-memory.dmp

      Filesize

      64KB

    • memory/2844-10-0x00007FFA57C00000-0x00007FFA57C10000-memory.dmp

      Filesize

      64KB

    • memory/2844-11-0x00007FFA57C00000-0x00007FFA57C10000-memory.dmp

      Filesize

      64KB

    • memory/2844-48-0x000001E8C4580000-0x000001E8C4590000-memory.dmp

      Filesize

      64KB

    • memory/2844-47-0x000001E8C4650000-0x000001E8C4660000-memory.dmp

      Filesize

      64KB