Analysis

  • max time kernel
    134s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2024 18:46

General

  • Target

    LovelyCraftPistonTrap Win64 v.0.1-175/LovelyCraftPistonTrap_Data/StreamingAssets/aa/AddressablesLink/link.xml

  • Size

    24KB

  • MD5

    a786d29ac2eb4c5aa8a3795bf0b2d369

  • SHA1

    6cef4b6e0241a36ef8b092faece8fa9856b96319

  • SHA256

    2f94f75de37e65d238988b1ce2905db1f088ab50705e885258923367b6d0f6ab

  • SHA512

    3205adf5787d1c886fbad02864561cbf3a4681cc223971ca9b86da983a0fb69a351dfd1abcd254f57c35187b174c5112fe27698c43a27b837f051a8f964b28e2

  • SSDEEP

    192:tru/B9z7p2n1ZpE9mdiOsuDakA7yeLwGfvfAKoObOrurTFTfTITL1RCUaPf:UMRsoakEmYfAKoXgTn

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\LovelyCraftPistonTrap Win64 v.0.1-175\LovelyCraftPistonTrap_Data\StreamingAssets\aa\AddressablesLink\link.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2140
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2164
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2164 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0dacc780bb5399d33dceab72be75248e

    SHA1

    efe9e8192b1361993eb0134f6d484b776f56731e

    SHA256

    556afeb7461e6c8eacbcb0a114cd09c16d37360b363c378a4558fe1e1506657b

    SHA512

    202d627e9b40d9580fbd115fcf2a619d3b51e083d109721174bc682e2b82c321def98ef713f94420e234b0dc385271d155f8a751d50342fecad27d1ddd8e5933

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5982f8d94d46a1eb94dd6b0d67c852c9

    SHA1

    979a240f3ea27486278f77bc8f582451202bda8f

    SHA256

    82a7f0f8d48b2da022cfba5b8ba6a9c3fc84c500b5c4fe5ada14bc869acf5861

    SHA512

    fc65e03ff3b3ee524c552f5ace950c4acb5f55b0ef636d3c110be44b9a656e1b67c5dd5f6bc87f1b5ac468b5282c6013f027b177e923eb6f1f43d5fb0294cce0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2ba6f125c4a3fe6036b11dcdd304ff85

    SHA1

    cdcdb78d3ff92cfe28021b45f78bae520d03dce0

    SHA256

    05e1b82f8bb09073e6477aea8c2ad5e2305b93235a85ea8df2dfe683360d8e5a

    SHA512

    6cff8d93ba0862b71bff346497d6b5171d9544e14855ea92896b9f10cd321a43bf96136bc23ccc4d8dda1ff7726cd55e73210a512461a8ac33f809f45300bfe6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    020d1ceb8107311c1f1c164fa5f5de41

    SHA1

    be38ce0ca0bd1511e180b31ae5c61adb83eaa6c5

    SHA256

    74c89756a35263077a4be2dab2f038ec8fd98214254fb29e1ab17676eb7e3776

    SHA512

    919286c79b7f71918a23f69faaca9f2cc239889d032cc494f254c2ea2b1631231c250b2a1bdeffdc284afb400c82706b3172359fdf3885d9084c9230f9146ab0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2b949eb912d665a72fec48cf9c6d049f

    SHA1

    4c19392b3b039b4f65fc6fbb9e6559b4174187a1

    SHA256

    1942b4e013d09d24d02e19bc718a9e6af5ccbe7f00143ced9bc691f01accfba5

    SHA512

    b3104d29019c0ca932f77b17643462cb50a8079ef4c1b393afc67d2241c1a2bfc4434ec50953776f6daf572c567311a8bccfe3ba368245f9efc87b1678dbca45

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bb5a9bc67dd9d40a6b0319ba20e5e359

    SHA1

    49de056579e0d288d7fc2bcee898ec4c914351ef

    SHA256

    c5d3923e89d04f4ec694b7b8981ed5714ba75827c8ecdeb59fc140730816562c

    SHA512

    6e620f7b1ffd488189d7f0e353693e58bb98b9aa74c0d7e40ce01cf1c0d390ee66cf9f1fac3a8918465437052604570c6a5027f46ea25f7ea13429b7b0cd4e8f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b3cc1e5bdc4f27329eee4650b24c28b3

    SHA1

    8829ce2e2d63d5ecbc59e5b4e6eb84315223bcf0

    SHA256

    57a6b4809987c421052265935de69136fb9c06e7907940995061b42d3705396a

    SHA512

    2a89a002679af6ba4f7e94baf494e2637401151d21a7f8a0fddad68ff29927d327536cc87929471598c271d25828b85a33c714cdb6f13a5920a2bd73bd360efd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    640acd877003829dcfdbaf32a12ec47e

    SHA1

    e6a829dbb095888d2a45def9ee423a477be3a6d3

    SHA256

    d028cba643f1ff247e3036ad8b06f269defc56335f525588048827e01fe9339c

    SHA512

    aaf8c32d7e75e0baaab53defb048f3e461a44765c90e85ac46b808d5dc27d733b29435937cac82bc3e2cec10e2c05602e18a7a6220a1b0f9915a7c0a5bb4e6d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9aab7951b9080c581db519704a99c7b1

    SHA1

    71660e7e18083e9d1bf6184917b276f5460e0714

    SHA256

    14b648d1d71d88fc5d1d75b2568614c358152860a9ed56a2f5e5a04829da31fb

    SHA512

    6ffb1ffb7346257ed6256e33ed50626354aab73dd2ae337f121823900ea98283e5e263c54f91d30ec1ea4fb9ba5359ea5470952cbb969e0507c595dd58c5378c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2ef28be1f29dd5904b7093a364ef327d

    SHA1

    2b0db7c5e89b7d916cbba802efe504e72680bf8b

    SHA256

    41c2a1ed382939768d2acb02e929f1abc1400cf69e363a0c6bc6b7a6df74242d

    SHA512

    7f1ba16877dfc26e48eb19d35397ea144314f1f57c0879809ddb42f366f9a3e18cd01041ff8e1dad59fb1befbb60550cd0af991bbcd273c550b2436a581ff4a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    64649482b40b3c52f06e755ba1130cc5

    SHA1

    e9635b28ec2ec91114c32eb803dc31cc59755ce5

    SHA256

    14311d4e28d1a3fc6336b53a92282a57ad5f2aab86d336d748297c57fc19157f

    SHA512

    3b52b974d9c5383987ddb44dd97441a7fe6f5a4f719a4feabcc24547b2762fdda7ad83cecba1801870123af2cd2bae2de383f329cd031b0e35c03a883c6aea87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8b7f4bffcdbedd10cc702ea7af299efb

    SHA1

    7c71bb5227aaa5f7384f1461d9a63e001bcaddb3

    SHA256

    b2282c5616d92659ac6128b6ec6043eb06b35c49ad87788acab2fc0df3a93829

    SHA512

    77601b44e670d4176cd248cd48d3780d4e53d8027640c08447628aaed8d2dc080a0f78e688133de5b7f5424bbb34733a47939d61e2263153603072a24fb6aee8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d2b121b32da697ed98741db04e513842

    SHA1

    0ed6288bbb39eb602e40dd3caa9a78126d053580

    SHA256

    e191aff2c6770964efd9cd5e9809e312defcec365dba37f48f7fb2425d4dc5ee

    SHA512

    d64bb6f6683acfcd0a1d649883e7f539d32dd99c765b81ff2869e10ba60003bf86e68cd28ef3a24affbc733017af0a48627148ded0da477032f9a0f56a531158

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9e900c4e22ccc9a170df3596bd6d18a4

    SHA1

    cf96f397c46bb6c2451b167952498da6cfe5b2fb

    SHA256

    815e0c056de21e7c917776908e518403e78f7a0d5f6c307367f6f50dea863b40

    SHA512

    31bb8219dc8127f27688b5f3edc4842e34a8d4dc507ce23347bbf1f15d5a58ba4880504d1566eef12c90098fdeb259ddafa679f0b466f155d4beaff7385fc7a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a10a64c4bd0d6bd0072ca1697c4a6926

    SHA1

    aeb14344ffdf86d97acde4be7e35e41b5e4e0022

    SHA256

    5e0f016a21b9f32531f350450ed6cfd6d519941f037d6e3c178a695b8aa758bb

    SHA512

    3c142883c3bcec471600441beb81aa80f137e2bfcc8fc8545db9c8ee52076b0633c0be64d87ad639519458ec02c68ae3531c42ad3d8c6db6e534ff1ab49e8c09

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7dde925e4673c58da6b6d2e23948933b

    SHA1

    8088a2cb8a6224f1866f72141ebe983f0822f6b4

    SHA256

    27354613bdda7ce388060bf22666ac72b476fdce2489877482098109e8103e73

    SHA512

    be79e7fe4cb00040541371653fc869f50da1d89246ebde5b08eac3ea5cc5ede7c3b8b728c89f3ec0d24187118b3321f0d29df29a650ee14c1d3c69be21112144

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c978744510c4035c511f80275ee30f70

    SHA1

    b5234ede2d41f33f6fb7ee2aa7f82f9eb29f4837

    SHA256

    19288babfb9cfa0b4f140b78b450dc5d430e35548a13a0288112d6c04631ea48

    SHA512

    26f5c7e6d5e6a9f012fa93d4078119d76e361a10e722b3c04c6edaf2374481c73f558c2058a837874b54bbdff0fe4dfd67d95e6bced5c2ba9f4ee1018f5255de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    27ad38041e55233def3bd0c9f16f82d3

    SHA1

    ce822c85ac00f9e5efda0ad0901721a138298a7b

    SHA256

    d37ee150da99b6ac804df997c50cfdcb84602bd590001eb0eec865c155fbc2ca

    SHA512

    ef49b038251a51bde2efce2ca22d816dee7da42d90668a261e675c0eafdb87399c021154352409ea3b2ca75a5a7b577ac2cb02783fa40c09eecef32992f97a71

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f9fb6f325a75d9f87ef5ef91a5d380de

    SHA1

    58fda02b3b4a88a6bbbba10bbf2328c2058e4401

    SHA256

    4d6fd0b6905e68d68ebd5c27f9055f6f508fa0304028699470315f63544ac612

    SHA512

    d987afad212978c37530277c198d4f51a860171e0858a81b4bebad13b7f4f62cee1075ea6885cce51e6c3b28b4a7ab3a33c64b684e2ce2ea01d3cc0799a6a0bd

  • C:\Users\Admin\AppData\Local\Temp\CabB213.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB293.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b