Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2024 18:46

General

  • Target

    LovelyCraftPistonTrap Win64 v.0.1-175/LovelyCraftPistonTrap.exe

  • Size

    651KB

  • MD5

    904e8e2171d7ad133dff57a9ff4ab264

  • SHA1

    90d9b7dd2fe73e5bc88fecd4c4b7059dacc3efd1

  • SHA256

    871d6b599a13b1ddc45ae0ed7bad20e024200ad01701b53aa208263ffb76d925

  • SHA512

    cd4ead406b4f0dc0c04b214e0b6d5a709e471c0fe2747eb42b9ce159bd8fd57bbb4f8fcde1d50516504dc898c6b7b8c86540ec3f4f552bc0a0f2ebaef8a2e4eb

  • SSDEEP

    6144:C/7FG9mpcJ/OD8kU88bWrCPmGr00/O+Du1ksKbkPqQ9nVCHp:C/744aOD8NbWrDGr00/Oo+HPqQ9VCJ

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LovelyCraftPistonTrap Win64 v.0.1-175\LovelyCraftPistonTrap.exe
    "C:\Users\Admin\AppData\Local\Temp\LovelyCraftPistonTrap Win64 v.0.1-175\LovelyCraftPistonTrap.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\Users\Admin\AppData\Local\Temp\LovelyCraftPistonTrap Win64 v.0.1-175\UnityCrashHandler64.exe
      "C:\Users\Admin\AppData\Local\Temp\LovelyCraftPistonTrap Win64 v.0.1-175\UnityCrashHandler64.exe" --attach 2384 3149824
      2⤵
        PID:1644

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2384-42-0x000007FFFFEC0000-0x000007FFFFED0000-memory.dmp

      Filesize

      64KB

    • memory/2384-50-0x000007FFFFEA0000-0x000007FFFFEB0000-memory.dmp

      Filesize

      64KB