Analysis
-
max time kernel
1565s -
max time network
1566s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 16:43
Static task
static1
Behavioral task
behavioral1
Sample
2349-rocketleague-gold.png
Resource
win7-20240903-en
3 signatures
1800 seconds
Behavioral task
behavioral2
Sample
2349-rocketleague-gold.png
Resource
win10v2004-20241007-en
1 signatures
1800 seconds
General
-
Target
2349-rocketleague-gold.png
-
Size
47KB
-
MD5
65d4e8a08bde26e143e98c218e032fb5
-
SHA1
7718e354c4d0d9835e05b9953663fc9ddbcb06ae
-
SHA256
5793ed346b3109c2d62ebeea6cbab132e76e49ba1af94de2a6ad0725b79e4276
-
SHA512
25c0e6f245aa873c8e583e10f98d36f392cb8ddb96f5a1511918a241a7ee121a065df334afc643fb871e09c6b8fae4a16e4674a65d5fcce44f79c42b363cd7d9
-
SSDEEP
768:k1qUmBsz1M6hUY1U9ylRWLGu8VXjcgKishUU9jS1arvRvIqMSK046jYfe5BW+:/cMI93u8VBpsCV8Zuie+
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1608 rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1608 rundll32.exe 1608 rundll32.exe