Analysis

  • max time kernel
    119s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    07/08/2024, 03:20

General

  • Target

    CubismViewer5.exe

  • Size

    83KB

  • MD5

    fc609558bebab8bbd4414d813986a080

  • SHA1

    54c5538af52f194282b372a69a08d9fcc9fb2a49

  • SHA256

    17e1c871bfcb967a3fbc0b36f076a8e763839c61dd6e9f6558e4a0efdacc814f

  • SHA512

    5dd0101bddc71f2e4750d62d8b33d79c3db80c50dc82ae02d438c2535767e5fd956b79884c45c717f6adb70813eed70c2430dd77aa1374fee20b4e4f6e1d4331

  • SSDEEP

    768:Uftzk3RkAWpMmC921pbtCAvgtxMmC921pbtCAvgt12ToFbHcX5V1VaXLkjW:Uftzmb8BC9QUogtxBC9QUogtggbyP0R

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CubismViewer5.exe
    "C:\Users\Admin\AppData\Local\Temp\CubismViewer5.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\CubismViewer5.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Users\Admin\AppData\Local\Temp\app\jre\bin\java.exe
        app\jre\bin\java.exe -classpath "app\lib\Live2D_Cubism.jar;app\lib\annotations-13.0.jar;app\lib\basicplayer3.0.jar;app\lib\commons-beanutils-1.9.4.jar;app\lib\commons-collections4-4.4.jar;app\lib\commons-lang3-3.9.jar;app\lib\commons-logging-api.jar;app\lib\commons-text-1.8.jar;app\lib\flatlaf-2.6.jar;app\lib\flatlaf-extras-2.6.jar;app\lib\javax.activation-1.2.0.jar;app\lib\jdom-1.1.jar;app\lib\jl1.0.jar;app\lib\jna-5.6.0.jar;app\lib\jna-platform-5.6.0.jar;app\lib\jogg-0.0.7.jar;app\lib\jorbis-0.0.15.jar;app\lib\jpen-2.jar;app\lib\json-simple-1.1.jar;app\lib\jsonic-1.3.10.jar;app\lib\kotlin-reflect-1.7.21.jar;app\lib\kotlin-stdlib-1.7.21.jar;app\lib\kotlin-stdlib-common-1.7.21.jar;app\lib\kotlin-stdlib-jdk7-1.7.21.jar;app\lib\kotlin-stdlib-jdk8-1.7.21.jar;app\lib\Live2DCubismCore.jar;app\lib\Live2DCubismMotionSync.jar;app\lib\Live2DCubismPFUtils.jar;app\lib\log4j-api-2.17.0.jar;app\lib\log4j-core-2.17.0.jar;app\lib\log4j-iostreams-2.17.0.jar;app\lib\log4j-jcl-2.17.0.jar;app\lib\log4j-jul-2.17.0.jar;app\lib\mp3spi1.9.4.jar;app\lib\onnxruntime-1.13.1.jar;app\lib\opencsv-5.2.jar;app\lib\rlm1501.jar;app\lib\svgSalamander-1.1.4.jar;app\lib\tritonus_share.jar;app\lib\vorbisspi1.0.2.jar;app\lib\jogl\gluegen-rt.jar;app\lib\jogl\jogl-all.jar" -Djava.library.path="app\dll64;app\dll64\windows-amd64" -Djogamp.gluegen.UseTempJarCache=false -Dsun.java2d.d3d=false -Duser.language=ja -XX:MaxRAMPercentage=100 -showversion -Djava.locale.providers=COMPAT,SPI com.live2d.cubism.doc.modeling.ui.viewerForOriginalWorkflow.OWViewerDropFrame ""
        3⤵
        • Checks processor information in registry
        PID:2068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2068-5-0x0000000008900000-0x0000000008B70000-memory.dmp

    Filesize

    2.4MB

  • memory/2068-15-0x0000000008E90000-0x0000000009100000-memory.dmp

    Filesize

    2.4MB

  • memory/2068-18-0x00000000103C0000-0x0000000010630000-memory.dmp

    Filesize

    2.4MB

  • memory/2068-19-0x0000000008900000-0x0000000008B70000-memory.dmp

    Filesize

    2.4MB

  • memory/2068-21-0x0000000008E90000-0x0000000009100000-memory.dmp

    Filesize

    2.4MB

  • memory/2068-20-0x00000000103C0000-0x0000000010630000-memory.dmp

    Filesize

    2.4MB