Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-08-2022 15:02

General

  • Target

    修改器/游戏.电影菜单.exe

  • Size

    4.3MB

  • MD5

    723fac5412b21bd330f029f25394940f

  • SHA1

    518448403cbdc762981d04c1267f95cf1f3a7c81

  • SHA256

    e4b04016d16b94c4822d501ccce906c2119bfe7f535b15985eb070af2aef6cf6

  • SHA512

    54ca7b4fd23d5e2a6c23828aa54eac52f4931f94ecf4acd387e12917142287305035752d227e3cf746489fef9332e18437427b7efc667ce919d66fea95ae8af0

  • SSDEEP

    98304:N8XJC/xyLVUuzA2aJQd2zd5KseDtdD6Pq9L9vnoPGWzC+2vIHD:NUJC2VUcamUpMT6yL9voPGCCLY

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\修改器\游戏.电影菜单.exe
    "C:\Users\Admin\AppData\Local\Temp\修改器\游戏.电影菜单.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3040
    • C:\Users\Admin\AppData\Local\Temp\is-QL73Q.tmp\游戏.电影菜单.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-QL73Q.tmp\游戏.电影菜单.tmp" /SL5="$8005A,4060808,153088,C:\Users\Admin\AppData\Local\Temp\修改器\游戏.电影菜单.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4916
      • C:\Users\Admin\AppData\Local\Temp\修改器\Games.exe
        "C:\Users\Admin\AppData\Local\Temp\修改器\Games.exe"
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        PID:4540

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-QL73Q.tmp\游戏.电影菜单.tmp

    Filesize

    1.5MB

    MD5

    f0c35c57e05395958aef0812955f36cd

    SHA1

    5e64b5e29f84e00cfbb8eb20a213fbfd8e6efc5b

    SHA256

    564c1ba7f298bebeb0cd299f0d157816f5ee4fa0fcd85ad8478f6b0ce6ee5e32

    SHA512

    f7b7f7999cd659ea011ddd18e73068d7fb444f6e559aaf568f4d252033980e0b7ab9e2f10a028d763f62035aad816391e26910fd446a7c1d80db23288555118f

  • C:\Users\Admin\AppData\Local\Temp\is-QL73Q.tmp\游戏.电影菜单.tmp

    Filesize

    1.5MB

    MD5

    f0c35c57e05395958aef0812955f36cd

    SHA1

    5e64b5e29f84e00cfbb8eb20a213fbfd8e6efc5b

    SHA256

    564c1ba7f298bebeb0cd299f0d157816f5ee4fa0fcd85ad8478f6b0ce6ee5e32

    SHA512

    f7b7f7999cd659ea011ddd18e73068d7fb444f6e559aaf568f4d252033980e0b7ab9e2f10a028d763f62035aad816391e26910fd446a7c1d80db23288555118f

  • C:\Users\Admin\AppData\Local\Temp\修改器\Games.exe

    Filesize

    18.7MB

    MD5

    ec4fa2304daf43d2230c85ec365f58c7

    SHA1

    0adffbbd3e7f0dbd3dccdd6c6ab6365c74ec972b

    SHA256

    ac8bb80c4e75c03dfbaab50f00f5e921affc3e28636755f95dc37b538f4c9628

    SHA512

    79bcd6ce4da5864d496e85d1c3c87b2986489b20631a183fb4f915e4345fd9fa1025ad9d53dd94bce11f3ac4154f4283a7783ae7423390baa0789859fb285331

  • C:\Users\Admin\AppData\Local\Temp\修改器\Games.exe

    Filesize

    18.7MB

    MD5

    ec4fa2304daf43d2230c85ec365f58c7

    SHA1

    0adffbbd3e7f0dbd3dccdd6c6ab6365c74ec972b

    SHA256

    ac8bb80c4e75c03dfbaab50f00f5e921affc3e28636755f95dc37b538f4c9628

    SHA512

    79bcd6ce4da5864d496e85d1c3c87b2986489b20631a183fb4f915e4345fd9fa1025ad9d53dd94bce11f3ac4154f4283a7783ae7423390baa0789859fb285331

  • memory/3040-132-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/3040-137-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/3040-141-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/4540-145-0x0000000006920000-0x0000000006986000-memory.dmp

    Filesize

    408KB

  • memory/4540-153-0x00000000093C0000-0x00000000093C8000-memory.dmp

    Filesize

    32KB

  • memory/4540-142-0x00000000000E0000-0x00000000013A0000-memory.dmp

    Filesize

    18.8MB

  • memory/4540-143-0x0000000006870000-0x000000000687A000-memory.dmp

    Filesize

    40KB

  • memory/4540-144-0x0000000006880000-0x0000000006888000-memory.dmp

    Filesize

    32KB

  • memory/4540-157-0x000000000DA70000-0x000000000DBF6000-memory.dmp

    Filesize

    1.5MB

  • memory/4540-146-0x00000000068B0000-0x00000000068B8000-memory.dmp

    Filesize

    32KB

  • memory/4540-147-0x00000000068D0000-0x00000000068D8000-memory.dmp

    Filesize

    32KB

  • memory/4540-148-0x00000000068F0000-0x00000000068F8000-memory.dmp

    Filesize

    32KB

  • memory/4540-149-0x0000000006900000-0x0000000006908000-memory.dmp

    Filesize

    32KB

  • memory/4540-150-0x0000000006910000-0x0000000006918000-memory.dmp

    Filesize

    32KB

  • memory/4540-151-0x0000000006A90000-0x0000000006A98000-memory.dmp

    Filesize

    32KB

  • memory/4540-152-0x0000000006AA0000-0x0000000006AA8000-memory.dmp

    Filesize

    32KB

  • memory/4540-154-0x000000000FAF0000-0x000000000FB28000-memory.dmp

    Filesize

    224KB

  • memory/4540-155-0x000000000FAC0000-0x000000000FACE000-memory.dmp

    Filesize

    56KB

  • memory/4540-156-0x000000000D640000-0x000000000D648000-memory.dmp

    Filesize

    32KB