Analysis
-
max time kernel
151s -
max time network
120s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
19-07-2020 17:28
Static task
static1
Behavioral task
behavioral1
Sample
gameover_0.0.0.21.vir.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
gameover_0.0.0.21.vir.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
gameover_0.0.0.21.vir.exe
-
Size
3.6MB
-
MD5
d03a42dc109f4b890b3d1d0bd70e0e31
-
SHA1
38002380c8937a25ffc93aedfd73b2eb74c42eb7
-
SHA256
d6a8fb2eea4ebfd8d25afde9234335afca980c7c49d94ebda88db4a00c493c87
-
SHA512
05f487d2940692a370696df5ad65f343ee25c1d9456409392c990cac871fca37c90020e7e0ee11a85337cb73bc76707923f4d0b3777f15c1ac208878d2851966
Score
8/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
gameover_0.0.0.21.vir.exeejufu.exedescription pid process target process PID 1356 wrote to memory of 1424 1356 gameover_0.0.0.21.vir.exe ejufu.exe PID 1356 wrote to memory of 1424 1356 gameover_0.0.0.21.vir.exe ejufu.exe PID 1356 wrote to memory of 1424 1356 gameover_0.0.0.21.vir.exe ejufu.exe PID 1356 wrote to memory of 1424 1356 gameover_0.0.0.21.vir.exe ejufu.exe PID 1424 wrote to memory of 1128 1424 ejufu.exe taskhost.exe PID 1424 wrote to memory of 1128 1424 ejufu.exe taskhost.exe PID 1424 wrote to memory of 1128 1424 ejufu.exe taskhost.exe PID 1424 wrote to memory of 1128 1424 ejufu.exe taskhost.exe PID 1424 wrote to memory of 1128 1424 ejufu.exe taskhost.exe PID 1424 wrote to memory of 1256 1424 ejufu.exe Dwm.exe PID 1424 wrote to memory of 1256 1424 ejufu.exe Dwm.exe PID 1424 wrote to memory of 1256 1424 ejufu.exe Dwm.exe PID 1424 wrote to memory of 1256 1424 ejufu.exe Dwm.exe PID 1424 wrote to memory of 1256 1424 ejufu.exe Dwm.exe PID 1424 wrote to memory of 1324 1424 ejufu.exe Explorer.EXE PID 1424 wrote to memory of 1324 1424 ejufu.exe Explorer.EXE PID 1424 wrote to memory of 1324 1424 ejufu.exe Explorer.EXE PID 1424 wrote to memory of 1324 1424 ejufu.exe Explorer.EXE PID 1424 wrote to memory of 1324 1424 ejufu.exe Explorer.EXE PID 1424 wrote to memory of 1356 1424 ejufu.exe gameover_0.0.0.21.vir.exe PID 1424 wrote to memory of 1356 1424 ejufu.exe gameover_0.0.0.21.vir.exe PID 1424 wrote to memory of 1356 1424 ejufu.exe gameover_0.0.0.21.vir.exe PID 1424 wrote to memory of 1356 1424 ejufu.exe gameover_0.0.0.21.vir.exe PID 1424 wrote to memory of 1356 1424 ejufu.exe gameover_0.0.0.21.vir.exe PID 1356 wrote to memory of 1616 1356 gameover_0.0.0.21.vir.exe cmd.exe PID 1356 wrote to memory of 1616 1356 gameover_0.0.0.21.vir.exe cmd.exe PID 1356 wrote to memory of 1616 1356 gameover_0.0.0.21.vir.exe cmd.exe PID 1356 wrote to memory of 1616 1356 gameover_0.0.0.21.vir.exe cmd.exe PID 1356 wrote to memory of 1616 1356 gameover_0.0.0.21.vir.exe cmd.exe PID 1356 wrote to memory of 1616 1356 gameover_0.0.0.21.vir.exe cmd.exe PID 1356 wrote to memory of 1616 1356 gameover_0.0.0.21.vir.exe cmd.exe PID 1356 wrote to memory of 1616 1356 gameover_0.0.0.21.vir.exe cmd.exe PID 1356 wrote to memory of 1616 1356 gameover_0.0.0.21.vir.exe cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
ejufu.exepid process 1424 ejufu.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
ejufu.exepid process 1424 ejufu.exe 1424 ejufu.exe 1424 ejufu.exe 1424 ejufu.exe 1424 ejufu.exe 1424 ejufu.exe 1424 ejufu.exe 1424 ejufu.exe 1424 ejufu.exe 1424 ejufu.exe 1424 ejufu.exe 1424 ejufu.exe 1424 ejufu.exe 1424 ejufu.exe 1424 ejufu.exe 1424 ejufu.exe 1424 ejufu.exe 1424 ejufu.exe 1424 ejufu.exe 1424 ejufu.exe 1424 ejufu.exe 1424 ejufu.exe 1424 ejufu.exe 1424 ejufu.exe 1424 ejufu.exe 1424 ejufu.exe 1424 ejufu.exe 1424 ejufu.exe 1424 ejufu.exe 1424 ejufu.exe 1424 ejufu.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1616 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ejufu.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Windows\Currentversion\Run ejufu.exe Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Windows\CurrentVersion\Run\{FE7A6C08-DE7A-AD4A-FBCE-7998FCA35A85} = "C:\\Users\\Admin\\AppData\\Roaming\\Iqosd\\ejufu.exe" ejufu.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
gameover_0.0.0.21.vir.exedescription pid process Token: SeSecurityPrivilege 1356 gameover_0.0.0.21.vir.exe Token: SeSecurityPrivilege 1356 gameover_0.0.0.21.vir.exe Token: SeSecurityPrivilege 1356 gameover_0.0.0.21.vir.exe -
Loads dropped DLL 2 IoCs
Processes:
gameover_0.0.0.21.vir.exepid process 1356 gameover_0.0.0.21.vir.exe 1356 gameover_0.0.0.21.vir.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
gameover_0.0.0.21.vir.exedescription pid process target process PID 1356 set thread context of 1616 1356 gameover_0.0.0.21.vir.exe cmd.exe -
Processes:
gameover_0.0.0.21.vir.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Privacy gameover_0.0.0.21.vir.exe Set value (int) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" gameover_0.0.0.21.vir.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\gameover_0.0.0.21.vir.exe"C:\Users\Admin\AppData\Local\Temp\gameover_0.0.0.21.vir.exe"2⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
-
C:\Users\Admin\AppData\Roaming\Iqosd\ejufu.exe"C:\Users\Admin\AppData\Roaming\Iqosd\ejufu.exe"3⤵
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Adds Run key to start application
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp1fe2b664.bat"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp1fe2b664.bat
-
C:\Users\Admin\AppData\Roaming\Eteni\biox.mir
-
C:\Users\Admin\AppData\Roaming\Iqosd\ejufu.exe
-
C:\Users\Admin\AppData\Roaming\Iqosd\ejufu.exe
-
\Users\Admin\AppData\Roaming\Iqosd\ejufu.exe
-
\Users\Admin\AppData\Roaming\Iqosd\ejufu.exe
-
memory/1424-2-0x0000000000000000-mapping.dmp
-
memory/1616-6-0x0000000000050000-0x0000000000085000-memory.dmpFilesize
212KB
-
memory/1616-7-0x000000000006AECE-mapping.dmp