Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    14/08/2024, 11:37

General

  • Target

    by Vitruv_/datapacks/MCC Dodgebolt/data/system/functions/color_settings_b.mcfunction

  • Size

    24KB

  • MD5

    511b94e5351f151267d47d0d3f9c09e9

  • SHA1

    1dd1ea8ed2a099489819b616c056872cecf1fac8

  • SHA256

    9063d10b3e0033eb09a374fd400091cfea71b8c7b6477b9286980f03cd9583bc

  • SHA512

    6e8790c16947c7e6df6ca020f9a995b5d1441dd1493d2c884bf1fc319ddd592c528807d28f868c44cd93494c6f6b1c8f0fcb278868c1960411e668c8b781aa07

  • SSDEEP

    768:IWlgvxC+Wd27M6p+FU7+t/g+c5pk+OHPggbk2iRAOq/LE2lO6Fhq4C3l5LochuP6:IWlgvxC+Wd27M6p+FU7+t/g+c5pk+OHY

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\by Vitruv_\datapacks\MCC Dodgebolt\data\system\functions\color_settings_b.mcfunction"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\by Vitruv_\datapacks\MCC Dodgebolt\data\system\functions\color_settings_b.mcfunction
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2820
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\by Vitruv_\datapacks\MCC Dodgebolt\data\system\functions\color_settings_b.mcfunction"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    002386af4309f1b691120563a7aae0a6

    SHA1

    4c79e0e626309464335486def0ddedeb73cea0ce

    SHA256

    062ffe4e4cba5bbfca8d3019fc17354a6896423e6a0c078d28389a86c8ec076c

    SHA512

    af2accafa320b0d6290af99c1c9a9fe4832c3a847998571d48ea4b76ca02725effbcbbcc228975813b60c99c971b279e52bca0c5da3292a133e2096314ea8fff