Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20-08-2024 00:37

General

  • Target

    F1 2022 (Mobile) RP/blends/MinecraftF1_postbake.blend

  • Size

    3.7MB

  • MD5

    c58e8516dac0e76275fa2263feca3dfe

  • SHA1

    f3bcaace160d31e9144de80868390ed0f7cae27f

  • SHA256

    37d337281dee75aa00ccc125e8c5e5e36d46728796be2af222cb026f691f79f2

  • SHA512

    baf3256a4f93fb06271f18a81c470c8aa5b718c26ce5fa464b3316ae7c335517610f802b58e344d0e48c5c71004148e59ca8792d25c1874dd8580d036d58cfae

  • SSDEEP

    98304:/7uGkCzTVaxqW89Q/kE/OmeqQX57o4o1IG/9msWFI7LHiq2yuGTG:/7GkEfz1IGLiq2yuGTG

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\F1 2022 (Mobile) RP\blends\MinecraftF1_postbake.blend"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1488
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\F1 2022 (Mobile) RP\blends\MinecraftF1_postbake.blend
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2680
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\F1 2022 (Mobile) RP\blends\MinecraftF1_postbake.blend"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    8a6ac2ea526c030ddb1baf72c796e188

    SHA1

    ba41e38e3ff9649ce5768cdb23ee2f45cd9ef4a3

    SHA256

    50c43f777242733149f5d5c88d8ba28e3931fa9aaba1775b020c2d0ef5ca7913

    SHA512

    9462058724ca53c6e955b685db3bc14895b276ce778dda27d18809d34080f445e14e58f6bfe6a7b9fc3fd8cfead307ce18d88025637ed26c69682535c9477dcd