Resubmissions
15-08-2024 00:06
240815-ad6gwsydjm 313-08-2024 12:24
240813-pk89patamc 1013-08-2024 12:19
240813-phnj7ssgrg 1013-08-2024 12:11
240813-pc2vmsseqh 813-08-2024 12:03
240813-n73jzsxblp 713-08-2024 12:02
240813-n7qkessckh 1Analysis
-
max time kernel
48s -
max time network
41s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-08-2024 00:06
Static task
static1
Behavioral task
behavioral1
Sample
rocket-league-spotify-artwork.png
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
rocket-league-spotify-artwork.png
Resource
win10v2004-20240802-en
General
-
Target
rocket-league-spotify-artwork.png
-
Size
833KB
-
MD5
28952f1e3e40281a2fab2de9f228bc8a
-
SHA1
b4db183ea6ad6b6cc31c8cae5c6feba5352a1242
-
SHA256
40da1cd16fd7dff442fbf3241b58b5857012b0f3c28d84c59b7ff5b97f0ee735
-
SHA512
26a4d65a82d7594dd7cc65ecf372cd4abeb2367b7dc4589eb5e1ca55b868fae15995f0f3921580348d46e1bf2a6d803ceaad48792dde38c90ae593de8088d0b6
-
SSDEEP
12288:BXhYChvXgQEOUmrify0TXJq8UXyTIU8sGEcqu6vO3QSWh8Xsq0BD4jJyJoc2HaP6:jHFgQEjQsq3yckGDP3Qvq0BD4jJyJoB
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1808 taskmgr.exe Token: SeSystemProfilePrivilege 1808 taskmgr.exe Token: SeCreateGlobalPrivilege 1808 taskmgr.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe 1808 taskmgr.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\rocket-league-spotify-artwork.png1⤵PID:3764
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3740
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1808