Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-12-2024 12:52

General

  • Target

    Exodus-12.20/Shaders/BasicVS_Cylinder.cso

  • Size

    5KB

  • MD5

    82dc5f21710f20a7c2a963eeb24d5638

  • SHA1

    0678f9935b6be1737838629fd4f6343aebdad3ec

  • SHA256

    a8883c8daf07738f82b65cd2569d15171d9c4eb85b34db050f5d0e6b78cc0e2b

  • SHA512

    5d265c563c2315633639fc6e71e2a20d10b36a6503e15710933374f42acc4f907e7db1c071bac6ded1d394f05a291e34c9021adcdd022eec39589b7af6f07078

  • SSDEEP

    96:quFlJMzLNmYw3NIdTOvCqyYKYAmCPnyQcUDDeZT8MfAObnMe4AMoSsPJcIh:s/83NIdTDxkCPnyQcUDDeZT8M9bnMe4s

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Exodus-12.20\Shaders\BasicVS_Cylinder.cso
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2072
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Exodus-12.20\Shaders\BasicVS_Cylinder.cso
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2152
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Exodus-12.20\Shaders\BasicVS_Cylinder.cso"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    207ba4696c5bfd46a4e53daf4961726a

    SHA1

    242e88240fbdf10307afeb449558ed08f91135c7

    SHA256

    4ea5bb5f0b87df669d8379af65270dec7c9083702fd4b189080fa605b36a5b1b

    SHA512

    27a13192036e60a98b0ca81ca289e9c81d362647b97c05605d25d82cca59ebfb474f81e8a7f070d0f3f12792addb9db9c2d7e76393e70f6f128e6629aa0673dc