Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240215-es
  • resource tags

    arch:x64arch:x86image:win7-20240215-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    11/06/2024, 17:43

General

  • Target

    Aseprite-v1.3.6-trial/data/extensions/adigunpolack-palettes/simplejpc-16.gpl

  • Size

    884B

  • MD5

    b69b8b28c90adde99517ca3d49817225

  • SHA1

    213117a12dec2c441ed61290d05f0372514e3a0a

  • SHA256

    f57fff21f0992cdb03c22151ca42033d7b4b82601717d3dcefeaf67a35856f85

  • SHA512

    5d136026661205e5df0914ab3d10a1e5ce61a4ffd22d5a0601ab9d919ef7cae289ca62c9c20436a41b22f58ba38a1f7e0d62062d2069a4f3cd68a911b66063f8

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Aseprite-v1.3.6-trial\data\extensions\adigunpolack-palettes\simplejpc-16.gpl
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2352
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Aseprite-v1.3.6-trial\data\extensions\adigunpolack-palettes\simplejpc-16.gpl
      2⤵
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads