Analysis
-
max time kernel
146s -
max time network
192s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
27-07-2021 18:26
Static task
static1
Behavioral task
behavioral1
Sample
Game Loader.bin.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Game Loader.bin.exe
Resource
win10v20210408
General
-
Target
Game Loader.bin.exe
-
Size
164KB
-
MD5
2db4d78b81c809eecfa43b9dadfa21cb
-
SHA1
c2c2b5e93a51d59594fc81b912fdb579f78b3c24
-
SHA256
26cce10b3769c83798a2b6a000ca438f2e8fd98817bee9fad223157543b97483
-
SHA512
41de2a56a7f19bf5cbe0b2050fc1bd1ab835372adf6e15bd3ca36f68b120d4ceafb6c574b9dbeb9f11e9a99fcbbf20edd3280218c5df12478ca69989c59b5f24
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
server.exeGame Loader.exepid process 1568 server.exe 1744 Game Loader.exe -
Modifies Installed Components in the registry 2 TTPs
-
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\server.exe upx \Users\Admin\AppData\Local\Temp\server.exe upx C:\Users\Admin\AppData\Local\Temp\server.exe upx C:\Users\Admin\AppData\Local\Temp\server.exe upx behavioral1/memory/1768-76-0x0000000010000000-0x000000001004D000-memory.dmp upx C:\Windows\SysWOW64\Windows\taskhost.exe upx -
Loads dropped DLL 3 IoCs
Processes:
Game Loader.bin.exepid process 1140 Game Loader.bin.exe 1140 Game Loader.bin.exe 1140 Game Loader.bin.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
server.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Windows\\system32\\Windows\\taskhost.exe" server.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run server.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "C:\\Windows\\system32\\Windows\\taskhost.exe" server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Windows\\system32\\Windows\\taskhost.exe" svchost.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "C:\\Windows\\system32\\Windows\\taskhost.exe" svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run server.exe -
Drops file in System32 directory 3 IoCs
Processes:
server.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Windows\taskhost.exe server.exe File created C:\Windows\SysWOW64\Windows\taskhost.exe server.exe File opened for modification C:\Windows\SysWOW64\Windows\ server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Game Loader.bin.exeserver.exepid process 1140 Game Loader.bin.exe 1568 server.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
Game Loader.bin.exeserver.exedescription pid process target process PID 1140 wrote to memory of 1568 1140 Game Loader.bin.exe server.exe PID 1140 wrote to memory of 1568 1140 Game Loader.bin.exe server.exe PID 1140 wrote to memory of 1568 1140 Game Loader.bin.exe server.exe PID 1140 wrote to memory of 1568 1140 Game Loader.bin.exe server.exe PID 1140 wrote to memory of 1744 1140 Game Loader.bin.exe Game Loader.exe PID 1140 wrote to memory of 1744 1140 Game Loader.bin.exe Game Loader.exe PID 1140 wrote to memory of 1744 1140 Game Loader.bin.exe Game Loader.exe PID 1140 wrote to memory of 1744 1140 Game Loader.bin.exe Game Loader.exe PID 1568 wrote to memory of 1768 1568 server.exe svchost.exe PID 1568 wrote to memory of 1768 1568 server.exe svchost.exe PID 1568 wrote to memory of 1768 1568 server.exe svchost.exe PID 1568 wrote to memory of 1768 1568 server.exe svchost.exe PID 1568 wrote to memory of 1768 1568 server.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Game Loader.bin.exe"C:\Users\Admin\AppData\Local\Temp\Game Loader.bin.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe" 02⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\Game Loader.exe"C:\Users\Admin\AppData\Local\Temp\Game Loader.exe" 02⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Game Loader.exeMD5
eb307312f004e6ad7edd5661642b3bfe
SHA105eb1032f6d0f11584772da4b137560772032ea4
SHA256cc2d343d43eb76e982a829aeb884d781e10c28a00661e1d3fd3875c2bd9bb357
SHA512d483a9594205b176712c52bd91c7534b885ad4d51b281159d564f5ec50e4a96dfaa4807efc27cf1af49ad57f086fa61ed54b838f96bcdfdbbd2b784eebdc3c95
-
C:\Users\Admin\AppData\Local\Temp\Game Loader.exeMD5
eb307312f004e6ad7edd5661642b3bfe
SHA105eb1032f6d0f11584772da4b137560772032ea4
SHA256cc2d343d43eb76e982a829aeb884d781e10c28a00661e1d3fd3875c2bd9bb357
SHA512d483a9594205b176712c52bd91c7534b885ad4d51b281159d564f5ec50e4a96dfaa4807efc27cf1af49ad57f086fa61ed54b838f96bcdfdbbd2b784eebdc3c95
-
C:\Users\Admin\AppData\Local\Temp\server.exeMD5
c66034653c7c07a3d91486a7773cb630
SHA13ff37b07cb6e6838b65bf678ec0df5c19a20e3aa
SHA256eb2c4c21eb7f6080a1fcb4ad84a7526497254138c9b2f60506cb346b97a19147
SHA5122de8eb0ae57660fc306ea5cde383b4774f16f8ca7613aa74f892b2378998bfd9515138fbaeabd7b00c05505b8ac9b69f137a7f92d4e7c3be2f8616e0370eeadc
-
C:\Users\Admin\AppData\Local\Temp\server.exeMD5
c66034653c7c07a3d91486a7773cb630
SHA13ff37b07cb6e6838b65bf678ec0df5c19a20e3aa
SHA256eb2c4c21eb7f6080a1fcb4ad84a7526497254138c9b2f60506cb346b97a19147
SHA5122de8eb0ae57660fc306ea5cde383b4774f16f8ca7613aa74f892b2378998bfd9515138fbaeabd7b00c05505b8ac9b69f137a7f92d4e7c3be2f8616e0370eeadc
-
C:\Windows\SysWOW64\Windows\taskhost.exeMD5
c66034653c7c07a3d91486a7773cb630
SHA13ff37b07cb6e6838b65bf678ec0df5c19a20e3aa
SHA256eb2c4c21eb7f6080a1fcb4ad84a7526497254138c9b2f60506cb346b97a19147
SHA5122de8eb0ae57660fc306ea5cde383b4774f16f8ca7613aa74f892b2378998bfd9515138fbaeabd7b00c05505b8ac9b69f137a7f92d4e7c3be2f8616e0370eeadc
-
\Users\Admin\AppData\Local\Temp\Game Loader.exeMD5
eb307312f004e6ad7edd5661642b3bfe
SHA105eb1032f6d0f11584772da4b137560772032ea4
SHA256cc2d343d43eb76e982a829aeb884d781e10c28a00661e1d3fd3875c2bd9bb357
SHA512d483a9594205b176712c52bd91c7534b885ad4d51b281159d564f5ec50e4a96dfaa4807efc27cf1af49ad57f086fa61ed54b838f96bcdfdbbd2b784eebdc3c95
-
\Users\Admin\AppData\Local\Temp\server.exeMD5
c66034653c7c07a3d91486a7773cb630
SHA13ff37b07cb6e6838b65bf678ec0df5c19a20e3aa
SHA256eb2c4c21eb7f6080a1fcb4ad84a7526497254138c9b2f60506cb346b97a19147
SHA5122de8eb0ae57660fc306ea5cde383b4774f16f8ca7613aa74f892b2378998bfd9515138fbaeabd7b00c05505b8ac9b69f137a7f92d4e7c3be2f8616e0370eeadc
-
\Users\Admin\AppData\Local\Temp\server.exeMD5
c66034653c7c07a3d91486a7773cb630
SHA13ff37b07cb6e6838b65bf678ec0df5c19a20e3aa
SHA256eb2c4c21eb7f6080a1fcb4ad84a7526497254138c9b2f60506cb346b97a19147
SHA5122de8eb0ae57660fc306ea5cde383b4774f16f8ca7613aa74f892b2378998bfd9515138fbaeabd7b00c05505b8ac9b69f137a7f92d4e7c3be2f8616e0370eeadc
-
memory/1140-61-0x0000000075D41000-0x0000000075D43000-memory.dmpFilesize
8KB
-
memory/1568-64-0x0000000000000000-mapping.dmp
-
memory/1744-71-0x00000000013B0000-0x00000000013B1000-memory.dmpFilesize
4KB
-
memory/1744-77-0x0000000000DA0000-0x0000000000DA1000-memory.dmpFilesize
4KB
-
memory/1744-68-0x0000000000000000-mapping.dmp
-
memory/1744-79-0x0000000000DA5000-0x0000000000DB6000-memory.dmpFilesize
68KB
-
memory/1744-80-0x0000000000DB6000-0x0000000000DB7000-memory.dmpFilesize
4KB
-
memory/1768-73-0x0000000000000000-mapping.dmp
-
memory/1768-76-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB