Resubmissions

12-09-2024 20:50

240912-zmmtkstfkj 3

12-09-2024 20:47

240912-zlcxzsthne 6

Analysis

  • max time kernel
    120s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-09-2024 20:47

General

  • Target

    angrybirdsmaker0.4.2.1-dist/angrybirdsmaker0.4.2.1-dist/ABM_0.4.2.1_ASDK_.compiled/config.lua

  • Size

    396B

  • MD5

    3ed544607f218cfa56fb62d366c95155

  • SHA1

    f00b20743006f9cb7619892de86febec45e5ba23

  • SHA256

    6148fcf356239f885fcefff94a9f5d56cd038af9e3a6576118d908f685f7d185

  • SHA512

    fb4dbbe4c84493af7af5bc93a0dae0851cf434af7781edcfc672e80cb91c00b10eaafe1668d9e01ded4327a64fc2c36438a5157e8b4b6a0921f1f20acb5ccf00

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\angrybirdsmaker0.4.2.1-dist\angrybirdsmaker0.4.2.1-dist\ABM_0.4.2.1_ASDK_.compiled\config.lua
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1580
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\angrybirdsmaker0.4.2.1-dist\angrybirdsmaker0.4.2.1-dist\ABM_0.4.2.1_ASDK_.compiled\config.lua
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2852
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\angrybirdsmaker0.4.2.1-dist\angrybirdsmaker0.4.2.1-dist\ABM_0.4.2.1_ASDK_.compiled\config.lua"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    2835db29ac3747b8a5d02a61787a9cf0

    SHA1

    5bf0c9cfafd350eef3dbe7ad8fff688212969e4d

    SHA256

    1c9654496deee7536d0465eed3beecb2bfbeb790aa153dc37c48f573bffa44a6

    SHA512

    5e2263bfdb24761918b37e8927b680b2ebea6324fc2114421b94630c0b0c993113573a6413c30f509ea6dff1994d9aef2d17615dd3f2b05440092d1a9a93a9ec