Resubmissions

15-08-2024 00:06

240815-ad6gwsydjm 3

13-08-2024 12:24

240813-pk89patamc 10

13-08-2024 12:19

240813-phnj7ssgrg 10

13-08-2024 12:11

240813-pc2vmsseqh 8

13-08-2024 12:03

240813-n73jzsxblp 7

13-08-2024 12:02

240813-n7qkessckh 1

Analysis

  • max time kernel
    48s
  • max time network
    41s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-08-2024 00:06

General

  • Target

    rocket-league-spotify-artwork.png

  • Size

    833KB

  • MD5

    28952f1e3e40281a2fab2de9f228bc8a

  • SHA1

    b4db183ea6ad6b6cc31c8cae5c6feba5352a1242

  • SHA256

    40da1cd16fd7dff442fbf3241b58b5857012b0f3c28d84c59b7ff5b97f0ee735

  • SHA512

    26a4d65a82d7594dd7cc65ecf372cd4abeb2367b7dc4589eb5e1ca55b868fae15995f0f3921580348d46e1bf2a6d803ceaad48792dde38c90ae593de8088d0b6

  • SSDEEP

    12288:BXhYChvXgQEOUmrify0TXJq8UXyTIU8sGEcqu6vO3QSWh8Xsq0BD4jJyJoc2HaP6:jHFgQEjQsq3yckGDP3Qvq0BD4jJyJoB

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 32 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\rocket-league-spotify-artwork.png
    1⤵
      PID:3764
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:3740
      • C:\Windows\system32\taskmgr.exe
        "C:\Windows\system32\taskmgr.exe" /7
        1⤵
        • Checks SCSI registry key(s)
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1808

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1808-0-0x0000023B034E0000-0x0000023B034E1000-memory.dmp

        Filesize

        4KB

      • memory/1808-1-0x0000023B034E0000-0x0000023B034E1000-memory.dmp

        Filesize

        4KB

      • memory/1808-2-0x0000023B034E0000-0x0000023B034E1000-memory.dmp

        Filesize

        4KB

      • memory/1808-8-0x0000023B034E0000-0x0000023B034E1000-memory.dmp

        Filesize

        4KB

      • memory/1808-12-0x0000023B034E0000-0x0000023B034E1000-memory.dmp

        Filesize

        4KB

      • memory/1808-11-0x0000023B034E0000-0x0000023B034E1000-memory.dmp

        Filesize

        4KB

      • memory/1808-9-0x0000023B034E0000-0x0000023B034E1000-memory.dmp

        Filesize

        4KB

      • memory/1808-10-0x0000023B034E0000-0x0000023B034E1000-memory.dmp

        Filesize

        4KB

      • memory/1808-7-0x0000023B034E0000-0x0000023B034E1000-memory.dmp

        Filesize

        4KB

      • memory/1808-6-0x0000023B034E0000-0x0000023B034E1000-memory.dmp

        Filesize

        4KB