Analysis

  • max time kernel
    104s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    21-12-2024 12:52

General

  • Target

    Exodus-12.20/Shaders/BasicVS_Box.cso

  • Size

    4KB

  • MD5

    cafc3f97947736e34dc88ed8b1afd4a5

  • SHA1

    0c98ffc41f320684fe3e2c2d5750f6c4e10171c1

  • SHA256

    26e5e2cf9272b6399db5ef662ad42704c17d1a3d5c68baf3f4a2a73e47a8d5f6

  • SHA512

    a9d19adcd07f930587ac02fbe889e2b9fb4b65e9f94ad85ce549f5da459b24d19e8be41a1cf50d81330fe5f6abae3fc8a1224647a2cc232aa61b4e4b2d23174f

  • SSDEEP

    96:NBTHRClJjDAKQAmD/nHCcGLczxZokWdMHw:XlCLD0D/nHCcG4zf7WdMQ

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Exodus-12.20\Shaders\BasicVS_Box.cso
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Exodus-12.20\Shaders\BasicVS_Box.cso
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2020
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Exodus-12.20\Shaders\BasicVS_Box.cso"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    fe49d59621015d277754d457dfbee200

    SHA1

    f5a7d7941eeb499670c50e6d268af996d0543ec7

    SHA256

    dc0f130fe0ad7c0e9d63c948939df80b53996755b39be22be5992ba65adea74f

    SHA512

    8346f0afe66a63ab7f97799af90ecc458330c105b83ecf776f45b5365bff452cc8b283253b86c060f62d8b43d0c421c720f689ecc6115f932c6a8c635fd73c3e