Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 17:36

General

  • Target

    savedgames/slot1/dlc04.savegamedata

  • Size

    58KB

  • MD5

    121806134e2b7053de32ff2db37b129f

  • SHA1

    21cd38ec883007f63a67f8060ef1d33b617ac99e

  • SHA256

    6c4fcaa74bafcda57e2a2bc91d94681ab522185b4edb305149c03f820c5721bf

  • SHA512

    ceedbe2e45e564b2cadf4e9bd300d9a12a24c72211cd2b37fcf63240dbee66b140d2816570f448c5cc768a3bccd1675bc3ee29de25e740f361cd642a7e712eb9

  • SSDEEP

    12:yrlldaVXOcobB0fflJySVvl2+lRu3eLcRudyVisESQ8SEHuSHs5gis92UIFgjlTH:yplYVeofXZlRu3LI4VRESQ8SEOzghw4

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\savedgames\slot1\dlc04.savegamedata
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2116
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\savedgames\slot1\dlc04.savegamedata
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1924
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\savedgames\slot1\dlc04.savegamedata"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:1236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    d3b6edeea5d1b89b62cf011413eb78cb

    SHA1

    25e5855c1f30376313574e2a227d369d797298ac

    SHA256

    0efac91635bed6fb59fb3a31a22e32d33da36011e1aa844b4a3c06271ca52574

    SHA512

    cd3c010a40ad534adf07dfacb09e9557eb09cc83ee22e582f1d2d255077277ab272d44051a468fef89b5a0398e9d7e7fc86d4c58198b945c43c334c222664385