Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    16-07-2024 10:54

General

  • Target

    FATALITY crack/cfg/rage.cfg

  • Size

    187KB

  • MD5

    8afa2113286ff459764485d570972a88

  • SHA1

    4ea9847b651ae1841504b0d44622ae67e36c90f3

  • SHA256

    b55e93983670dd54d4d492338e94bed3bced150c4e7c1e1fcdfd69b49f3c84b0

  • SHA512

    834e3adca04b27b5722c3d27dc729dbc6f5befb350104851f081c6ee7d0d60a0f0e3a0904cc4effe4955b2e94b368c44121c9ba1cd11d0dea38b9898c3b72a8e

  • SSDEEP

    768:Tddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddz:D

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\FATALITY crack\cfg\rage.cfg"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1540
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\FATALITY crack\cfg\rage.cfg
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2176
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\FATALITY crack\cfg\rage.cfg"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2100

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    91afb0bdc578bc35baea1df874bc47b8

    SHA1

    18f38a0fd84e880cb2479e29b5f943f33603e185

    SHA256

    d3f42f5bc3f0f49146fa9cf6dc1a53d1e6572d7834e731e386cfb5aec837231d

    SHA512

    3a378531f5addce32126af4aaacfbc27916f4976c6cf52da6dc3e064d19d32af19b2b06f564a125948bdb29ea3ac71f4c5270df90388880b4871e76337321de5