Analysis

  • max time kernel
    113s
  • max time network
    116s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/07/2024, 11:31

General

  • Target

    AmandaRoseTheGameOfTime.exe

  • Size

    1.7MB

  • MD5

    0e27cd83f10b8bb1ced4650f6d35dfeb

  • SHA1

    ee2e4dbb009a610d79a54b6e86a41a444d1df34c

  • SHA256

    60950d49257fa8e0135da985a36e46f098b176847f55c8df7b1eb9b4d73a2d8a

  • SHA512

    77186b85588b15a9caa3c80250f5111e6db0d40d60f9ce2bd2e486aa5acb2bcd524672e250048e4dba047d9767c6467a7e044af75c56b086ea926ce57f7c91cb

  • SSDEEP

    24576:Y+INKj8FzulA2/B2Km9iGpwpicGzr3F2/7MkOeB5sNFSsL5VaVo+X43K/pjLxVWG:Y+IYj0uRfm9voinFo9Ok5idqLwst

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AmandaRoseTheGameOfTime.exe
    "C:\Users\Admin\AppData\Local\Temp\AmandaRoseTheGameOfTime.exe"
    1⤵
    • Checks computer location settings
    • Checks whether UAC is enabled
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3452-0-0x0000000000400000-0x000000000074F000-memory.dmp

    Filesize

    3.3MB

  • memory/3452-1-0x0000000010000000-0x000000001017D000-memory.dmp

    Filesize

    1.5MB

  • memory/3452-2-0x0000000000D30000-0x0000000000EE9000-memory.dmp

    Filesize

    1.7MB

  • memory/3452-3-0x0000000000D30000-0x0000000000EE9000-memory.dmp

    Filesize

    1.7MB

  • memory/3452-5-0x00000000028F0000-0x00000000028F1000-memory.dmp

    Filesize

    4KB

  • memory/3452-4-0x0000000002850000-0x0000000002885000-memory.dmp

    Filesize

    212KB

  • memory/3452-6-0x00000000028F0000-0x00000000028F5000-memory.dmp

    Filesize

    20KB

  • memory/3452-12-0x0000000002A20000-0x0000000002A21000-memory.dmp

    Filesize

    4KB

  • memory/3452-11-0x0000000000800000-0x0000000000801000-memory.dmp

    Filesize

    4KB

  • memory/3452-10-0x0000000002900000-0x0000000002901000-memory.dmp

    Filesize

    4KB

  • memory/3452-9-0x00000000028E0000-0x00000000028E1000-memory.dmp

    Filesize

    4KB

  • memory/3452-13-0x00000000026B0000-0x00000000026B1000-memory.dmp

    Filesize

    4KB

  • memory/3452-8-0x0000000002A60000-0x0000000002A61000-memory.dmp

    Filesize

    4KB

  • memory/3452-7-0x0000000002A50000-0x0000000002A51000-memory.dmp

    Filesize

    4KB

  • memory/3452-22-0x0000000000400000-0x000000000074F000-memory.dmp

    Filesize

    3.3MB

  • memory/3452-23-0x0000000010000000-0x000000001017D000-memory.dmp

    Filesize

    1.5MB

  • memory/3452-27-0x0000000000D30000-0x0000000000EE9000-memory.dmp

    Filesize

    1.7MB

  • memory/3452-28-0x0000000002850000-0x0000000002885000-memory.dmp

    Filesize

    212KB

  • memory/3452-29-0x00000000028F0000-0x00000000028F1000-memory.dmp

    Filesize

    4KB

  • memory/3452-37-0x0000000010000000-0x000000001017D000-memory.dmp

    Filesize

    1.5MB