Overview
overview
3Static
static
3SpookyMilk...4p.zip
windows7-x64
1SpookyMilk...4p.zip
windows10-2004-x64
1EULA.txt
windows7-x64
1EULA.txt
windows10-2004-x64
1GameAssembly.dll
windows7-x64
1GameAssembly.dll
windows10-2004-x64
1Spooky Milk Life.exe
windows7-x64
1Spooky Milk Life.exe
windows10-2004-x64
1Spooky Mil...64.dll
windows7-x64
1Spooky Mil...64.dll
windows10-2004-x64
1Spooky Mil...ources
windows7-x64
1Spooky Mil...ources
windows10-2004-x64
1Spooky Mil..._extra
windows7-x64
1Spooky Mil..._extra
windows10-2004-x64
1Spooky Mil...p.info
windows7-x64
3Spooky Mil...p.info
windows10-2004-x64
3Spooky Mil...config
windows7-x64
3Spooky Mil...config
windows10-2004-x64
3Spooky Mil...nagers
windows7-x64
1Spooky Mil...nagers
windows10-2004-x64
1Spooky Mil...assets
windows7-x64
3Spooky Mil...assets
windows10-2004-x64
3Spooky Mil...s.ress
windows7-x64
3Spooky Mil...s.ress
windows10-2004-x64
3Spooky Mil...ta.dat
windows7-x64
3Spooky Mil...ta.dat
windows10-2004-x64
3Spooky Mil...es.dat
windows7-x64
3Spooky Mil...es.dat
windows10-2004-x64
3Spooky Mil...rowser
windows7-x64
3Spooky Mil...rowser
windows10-2004-x64
3Spooky Mil...tor.js
windows7-x64
3Spooky Mil...tor.js
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-10-2024 04:36
Static task
static1
Behavioral task
behavioral1
Sample
SpookyMilkLife_0.61.4p.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SpookyMilkLife_0.61.4p.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
EULA.txt
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
EULA.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
GameAssembly.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
GameAssembly.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Spooky Milk Life.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
Spooky Milk Life.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Spooky Milk Life_Data/Plugins/x86_64/steam_api64.dll
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
Spooky Milk Life_Data/Plugins/x86_64/steam_api64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Spooky Milk Life_Data/Resources/unity default resources
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Spooky Milk Life_Data/Resources/unity default resources
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Spooky Milk Life_Data/Resources/unity_builtin_extra
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Spooky Milk Life_Data/Resources/unity_builtin_extra
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Spooky Milk Life_Data/app.info
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Spooky Milk Life_Data/app.info
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Spooky Milk Life_Data/boot.config
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
Spooky Milk Life_Data/boot.config
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Spooky Milk Life_Data/globalgamemanagers
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Spooky Milk Life_Data/globalgamemanagers
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Spooky Milk Life_Data/globalgamemanagers.assets
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Spooky Milk Life_Data/globalgamemanagers.assets
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Spooky Milk Life_Data/globalgamemanagers.assets.ress
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Spooky Milk Life_Data/globalgamemanagers.assets.ress
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Spooky Milk Life_Data/il2cpp_data/Metadata/global-metadata.dat
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Spooky Milk Life_Data/il2cpp_data/Metadata/global-metadata.dat
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Spooky Milk Life_Data/il2cpp_data/Resources/mscorlib.dll-resources.dat
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Spooky Milk Life_Data/il2cpp_data/Resources/mscorlib.dll-resources.dat
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Spooky Milk Life_Data/il2cpp_data/etc/mono/2.0/Browsers/Compat.browser
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Spooky Milk Life_Data/il2cpp_data/etc/mono/2.0/Browsers/Compat.browser
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Spooky Milk Life_Data/il2cpp_data/etc/mono/2.0/DefaultWsdlHelpGenerator.js
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Spooky Milk Life_Data/il2cpp_data/etc/mono/2.0/DefaultWsdlHelpGenerator.js
Resource
win10v2004-20241007-en
General
-
Target
Spooky Milk Life_Data/boot.config
-
Size
104B
-
MD5
7ae118d8a23501ea05303eac83592c47
-
SHA1
5478891ff830f723d39c1335c242e95081933f8d
-
SHA256
7ecc279e1410e645cb6bf45347f38a6115751107dd380e619c3248c8feed684e
-
SHA512
8a3ae23efee757d85f68d8248125dc44e9e790ce71ce709455b9466bbfda4160bfd641c37f4e484e7b8154541f5fe627f4901bb5cb4b4ceb6d7304d042d0e3cc
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\config_auto_file\shell cmd.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_Classes\Local Settings cmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\config_auto_file\ cmd.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\.config cmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\.config\ = "config_auto_file" cmd.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\config_auto_file cmd.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\config_auto_file\shell\Read cmd.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\config_auto_file\shell\Read\command cmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\config_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" cmd.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2584 AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2584 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2584 AcroRd32.exe 2584 AcroRd32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 780 wrote to memory of 2584 780 cmd.exe 32 PID 780 wrote to memory of 2584 780 cmd.exe 32 PID 780 wrote to memory of 2584 780 cmd.exe 32 PID 780 wrote to memory of 2584 780 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Spooky Milk Life_Data\boot.config"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Spooky Milk Life_Data\boot.config"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD51466dbf5829751d685c865586780f9c9
SHA15cf8c7c89ba957db604e3d2f50bcc783912bb49c
SHA25601bfddff4821e6d2577780de43b3607c2dfd82c29d7b7cffc6ec170bf1280272
SHA5120a30733de04d96430fc4851a6af541c9f231a6ce954b015d6e79794348e989eaead81eb2757446d3720ae3d2d5b301811756dc2e928e3fbacd47b823030884c2