Analysis

  • max time kernel
    103s
  • max time network
    26s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2024 21:43

General

  • Target

    OverwatchWebcam Win64 v.0.4-97/OverwatchWebcam_Data/ScriptingAssemblies.json

  • Size

    4KB

  • MD5

    91623b423efe4b15c7824066151a4d10

  • SHA1

    cf39e4d66a4688fd7a3587900269589525e055a7

  • SHA256

    9b117f62d813ab84abdf94bd674ea78972411b3464de4bcad4d32d5240108022

  • SHA512

    58b68dd1fafcd8b8481d7c6b4586fa250f86d67c5723d719b4ac4c147b40dbe0def5b4e79bc0b54cf075a7afb11566d485922973fe91d0895238ea8f045b4e26

  • SSDEEP

    48:YXNAYrKXrjFRlClouNuQGoSfTG/fj5P7hHdmlhd9bmUFpDq7:G0jrlMouNtjfHdmbm/7

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\OverwatchWebcam Win64 v.0.4-97\OverwatchWebcam_Data\ScriptingAssemblies.json"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\OverwatchWebcam Win64 v.0.4-97\OverwatchWebcam_Data\ScriptingAssemblies.json
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2720
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\OverwatchWebcam Win64 v.0.4-97\OverwatchWebcam_Data\ScriptingAssemblies.json"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    3273fe957cd78b2edb0f91d525f469e5

    SHA1

    4b235779e791bd6b162d53167e7993f217e868ec

    SHA256

    3755b78e48261febfaaaae6cd0468aa5e0bae09bec350cd1b080a0a90a9f0a0a

    SHA512

    666ba4a54045898d60ce35281eeab04ae40197fb08e1dcf7d4ac18571ab0b2753ffee81b1f03c25d861c53c2ceda36c8542d30b357a55c783100d16134dc8b13