Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20-08-2024 00:37

General

  • Target

    F1 2022 (Mobile) RP/blends/MinecraftF1_postarm.blend1

  • Size

    3.7MB

  • MD5

    00d8f2a4044f69fac559eb096e3fe69a

  • SHA1

    279db6f8b14abc52bb2415a3c6e77cb4cf42739d

  • SHA256

    612af32188b27e9465742df8000d88259b67b17cb2665f8514fd3b23d1134c80

  • SHA512

    1e46ff5e0d7272b254743531175b91d6a742148733f78d13011bc33e8c2764abc4b3626701711614d0ad067fa24f8747496ec294a914ae4de71a4ad14de13e54

  • SSDEEP

    98304:hqW89Q6WeqQX57W2yuy/8RXrY9msWFI7L1kCzTVaiiZkEeOhNgTS:a22yp/8RXr2iZkEpNgTS

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\F1 2022 (Mobile) RP\blends\MinecraftF1_postarm.blend1"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1888
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\F1 2022 (Mobile) RP\blends\MinecraftF1_postarm.blend1
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1708
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\F1 2022 (Mobile) RP\blends\MinecraftF1_postarm.blend1"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:3016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    26de55bb3d832924b247d19c61cb2fe9

    SHA1

    5b3cb81882fc021707e006328f5e3fbc3a2ec1b3

    SHA256

    fdb80176e194562dd59a686939f39c8602baa8dceb9536ee881648de70e5a0d7

    SHA512

    cae35258b7d2322d21a63c3aa35f90d7e66d7b6e46d0d5e7bd697eb1b5dd6024124d158aaf5a6efd9a1167e425e56b76462b671052c81bf839fc1cb4b2c61fa7