Analysis

  • max time kernel
    122s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2024 04:36

General

  • Target

    Spooky Milk Life_Data/il2cpp_data/etc/mono/2.0/Browsers/Compat.browser

  • Size

    1KB

  • MD5

    0d831c1264b5b32a39fa347de368fe48

  • SHA1

    187dff516f9448e63ea5078190b3347922c4b3eb

  • SHA256

    8a1082057ac5681dcd4e9c227ed7fb8eb42ac1618963b5de3b65739dd77e2741

  • SHA512

    4b7549eda1f8ed2c4533d056b62ca5030445393f9c6003e5ee47301ff7f44b4bd5022b74d54f571aa890b6e4593c6eded1a881500ac5ba2a720dc0ff280300af

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Spooky Milk Life_Data\il2cpp_data\etc\mono\2.0\Browsers\Compat.browser"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1744
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Spooky Milk Life_Data\il2cpp_data\etc\mono\2.0\Browsers\Compat.browser
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2780
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Spooky Milk Life_Data\il2cpp_data\etc\mono\2.0\Browsers\Compat.browser"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    f7d7b88d991994d11178278c419069d0

    SHA1

    0952ce42aee142f4c768c69286fa4d6bec1e1900

    SHA256

    a42e3f5baef82398fc9183332ef829f2fb8ff72123109a79812d31abc17302b3

    SHA512

    eeac8441928b8b5070d13a6ca589b782c0aac471818022d666b3bd0e7adf90e230c0962098c83a1ba466d60023a618f4a39b86238c5aa8e7d53f9addf95034db