Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2024 18:46

General

  • Target

    LovelyCraftPistonTrap Win64 v.0.1-175/LovelyCraftPistonTrap_Data/StreamingAssets/aa/StandaloneWindow.bundle

  • Size

    101KB

  • MD5

    75aa4a541f7afa5e5fd77ba5194775a7

  • SHA1

    bffff3369cd21a1a77ae8be72edadeae29ed2f92

  • SHA256

    9dc863bfe0673e6d8b68804a77ac9838c7f51081be5a9e34044984121b278f43

  • SHA512

    37f067d378d31f8eb54eaea08ca1fd8eeb4b5082eaef47ca6063eca3704b50dbee5627423727f86b1164f9dad0d98ff4fcf0f577ffb48a4ecacb6c1cf5d22421

  • SSDEEP

    3072:ZNn1XunPQAWUtRaiIOHh9I3mXY6OEbkMJIt4:r9oQAW0aXOjuyXXIm

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\LovelyCraftPistonTrap Win64 v.0.1-175\LovelyCraftPistonTrap_Data\StreamingAssets\aa\StandaloneWindow.bundle"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1548
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\LovelyCraftPistonTrap Win64 v.0.1-175\LovelyCraftPistonTrap_Data\StreamingAssets\aa\StandaloneWindow.bundle
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1820
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\LovelyCraftPistonTrap Win64 v.0.1-175\LovelyCraftPistonTrap_Data\StreamingAssets\aa\StandaloneWindow.bundle"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    2535f851d7d2a9adcca64ec53eaa06f9

    SHA1

    5851446ac96487d3e50ad35e1601a3f7c037a7bf

    SHA256

    aad39b46e2d6bf4cf46e5758712fd2801be88df8007e7805cabfb83d7cd6efac

    SHA512

    2542ebf5ea8a86738b2e91c3b4dac8435baa9c1841ec4bcc03bb0832fcfc3c1c7bff0f862d25b88d0831b342556526ccaf29a9f885441657c1023b0c44555ad4