Analysis
-
max time kernel
11s -
max time network
12s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 10:10
Static task
static1
Behavioral task
behavioral1
Sample
SpongeBob Screen Toys.7z
Resource
win7-20240729-en
windows7-x64
4 signatures
150 seconds
General
-
Target
SpongeBob Screen Toys.7z
-
Size
30KB
-
MD5
caa68c86d28a767336a6971fad962cf2
-
SHA1
f6c6255110fa64e742e5071435f81681d580b700
-
SHA256
5f480c6fc1c6b9d4e879ae5ceac9a189d4fa6799540d758a4d918619576183f3
-
SHA512
0a9fe3d6449ebebe3af51061a272a68a040cfde8d036d6d8b77f9c1ab04e7d436b3e4b3d00582c22ac42a37359208243b8e28472ae2d865f37dff11f1501abfb
-
SSDEEP
768:CtDxyfibparzAOkesj/iptmXERQKYNVB+TgHQK:Ct0ibo6/iptqERQKYN7+TgwK
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2168 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2168 2208 cmd.exe 32 PID 2208 wrote to memory of 2168 2208 cmd.exe 32 PID 2208 wrote to memory of 2168 2208 cmd.exe 32 PID 2168 wrote to memory of 2644 2168 rundll32.exe 33 PID 2168 wrote to memory of 2644 2168 rundll32.exe 33 PID 2168 wrote to memory of 2644 2168 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\SpongeBob Screen Toys.7z"1⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\SpongeBob Screen Toys.7z2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\SpongeBob Screen Toys.7z3⤵
- Modifies registry class
PID:2644
-
-