Analysis

  • max time kernel
    146s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2024 18:46

General

  • Target

    LovelyCraftPistonTrap Win64 v.0.1-175/LovelyCraftPistonTrap.exe

  • Size

    651KB

  • MD5

    904e8e2171d7ad133dff57a9ff4ab264

  • SHA1

    90d9b7dd2fe73e5bc88fecd4c4b7059dacc3efd1

  • SHA256

    871d6b599a13b1ddc45ae0ed7bad20e024200ad01701b53aa208263ffb76d925

  • SHA512

    cd4ead406b4f0dc0c04b214e0b6d5a709e471c0fe2747eb42b9ce159bd8fd57bbb4f8fcde1d50516504dc898c6b7b8c86540ec3f4f552bc0a0f2ebaef8a2e4eb

  • SSDEEP

    6144:C/7FG9mpcJ/OD8kU88bWrCPmGr00/O+Du1ksKbkPqQ9nVCHp:C/744aOD8NbWrDGr00/Oo+HPqQ9VCJ

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LovelyCraftPistonTrap Win64 v.0.1-175\LovelyCraftPistonTrap.exe
    "C:\Users\Admin\AppData\Local\Temp\LovelyCraftPistonTrap Win64 v.0.1-175\LovelyCraftPistonTrap.exe"
    1⤵
    • Checks processor information in registry
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:392
    • C:\Users\Admin\AppData\Local\Temp\LovelyCraftPistonTrap Win64 v.0.1-175\UnityCrashHandler64.exe
      "C:\Users\Admin\AppData\Local\Temp\LovelyCraftPistonTrap Win64 v.0.1-175\UnityCrashHandler64.exe" --attach 392 2359123054592
      2⤵
        PID:4588
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x500 0x50c
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3676

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Hello Crime\Lovely Craft Piston Trap\Saves\auto_save.save

      Filesize

      187B

      MD5

      8fc53fa4fdc92a2881a260d3c66eba72

      SHA1

      eba8f89a4c54cc735f59d70224166f0f8de18c8b

      SHA256

      f4736841c669620870a9e297943a864b12d3c4fbc6c5aa9237047a44844c5d5d

      SHA512

      a9268e74bd66fe7914c4a7b4f258c68da9a252b2cb01a7c949bd916e1e161966e5ae066a0e7ab490b0f3ac5d449775534a7cf77af3bffe98916081df6108700c