Resubmissions

12/08/2024, 06:02

240812-grwm6ssfqc 7

12/08/2024, 05:19

240812-fz37jsxbqk 7

Analysis

  • max time kernel
    122s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    12/08/2024, 05:19

General

  • Target

    Heaven.Will.Be.Mine/Heaven Will Be Mine/HeavenWillBeMine_Data/sharedassets14.assets

  • Size

    7KB

  • MD5

    279f017875d0c8d0e8a223c15d50271b

  • SHA1

    2864a08bfcca546b693c278810eebf7a7c512e5e

  • SHA256

    0a40b66cfc384fd6c9b435af294f8b6f6a2848bce0cfdb661ae91e0b1aedf004

  • SHA512

    c8ac2b17ba33673cf6d10d928146a7c396270460134f3b709fbc29cefa5689278596566ff30b5936ce411e78cb9c51f7998c4be492c266b93ea298f504ac0c33

  • SSDEEP

    48:nyvZMCye0c4jrlmSO7HqzvZ+j1+NOndR4h8:yvyeCjwRKliQNb

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Heaven.Will.Be.Mine\Heaven Will Be Mine\HeavenWillBeMine_Data\sharedassets14.assets"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Heaven.Will.Be.Mine\Heaven Will Be Mine\HeavenWillBeMine_Data\sharedassets14.assets
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2708
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Heaven.Will.Be.Mine\Heaven Will Be Mine\HeavenWillBeMine_Data\sharedassets14.assets"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2600

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    28b5938bbf7b07cf7305f9925b5324fa

    SHA1

    06726ff4776ab25621355816e51def247ecdadee

    SHA256

    3b8db827b68998f1636ea4d2b9acac8806bcfbf6bd9adf142e019aabe5fe03de

    SHA512

    55a97753bc0c8fb168509090d4c981aa29f718c4ec50f7f6876d134ebe463eb6a5c81130015b4bc8f1b17d6a009d865b22ea80299b3fe15b9408e9290b54287c