Overview
overview
8Static
static
EasyAntiCh...up.exe
windows10-1703-x64
1GameAssembly.dll
windows10-1703-x64
3Modules/BE4v.dll
windows10-1703-x64
1UnityCrash...64.exe
windows10-1703-x64
1UnityPlayer.dll
windows10-1703-x64
1VRCLoader.dll
windows10-1703-x64
1VRChat.exe
windows10-1703-x64
1VRChat_Dat...eo.dll
windows10-1703-x64
3VRChat_Dat...RT.dll
windows10-1703-x64
VRChat_Dat...60.dll
windows10-1703-x64
VRChat_Dat...er.dll
windows10-1703-x64
VRChat_Dat...er.dll
windows10-1703-x64
3VRChat_Dat...ng.dll
windows10-1703-x64
3VRChat_Dat...in.dll
windows10-1703-x64
1VRChat_Dat...ss.dll
windows10-1703-x64
1VRChat_Dat...tor.js
windows10-1703-x64
1VRChat_Dat...ne.xml
windows10-1703-x64
1VRChat_Dat...gs.xml
windows10-1703-x64
1VRChat_Dat...eb.xml
windows10-1703-x64
VRChat_Dat...tor.js
windows10-1703-x64
1VRChat_Dat...ne.xml
windows10-1703-x64
1VRChat_Dat...gs.xml
windows10-1703-x64
1VRChat_Dat...eb.xml
windows10-1703-x64
1VRChat_Dat...tor.js
windows10-1703-x64
1VRChat_Dat...ne.xml
windows10-1703-x64
1VRChat_Dat...gs.xml
windows10-1703-x64
1VRChat_Dat...eb.xml
windows10-1703-x64
install.exe
windows10-1703-x64
1launch.exe
windows10-1703-x64
start_prot...me.exe
windows10-1703-x64
1shrek/bin/...1).dll
windows10-1703-x64
1shrek/bin/...or.exe
windows10-1703-x64
8Analysis
-
max time kernel
141s -
max time network
214s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
24-11-2022 23:26
Static task
static1
Behavioral task
behavioral1
Sample
EasyAntiCheat/EasyAntiCheat_EOS_Setup.exe
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
GameAssembly.dll
Resource
win10-20220901-en
Behavioral task
behavioral3
Sample
Modules/BE4v.dll
Resource
win10-20220901-en
Behavioral task
behavioral4
Sample
UnityCrashHandler64.exe
Resource
win10-20220812-en
Behavioral task
behavioral5
Sample
UnityPlayer.dll
Resource
win10-20220901-en
Behavioral task
behavioral6
Sample
VRCLoader.dll
Resource
win10-20220812-en
Behavioral task
behavioral7
Sample
VRChat.exe
Resource
win10-20220901-en
Behavioral task
behavioral8
Sample
VRChat_Data/Plugins/x86_64/AVProVideo.dll
Resource
win10-20220812-en
Behavioral task
behavioral9
Sample
VRChat_Data/Plugins/x86_64/AVProVideoWinRT.dll
Resource
win10-20220812-en
Behavioral task
behavioral10
Sample
VRChat_Data/Plugins/x86_64/Audio360.dll
Resource
win10-20220812-en
Behavioral task
behavioral11
Sample
VRChat_Data/Plugins/x86_64/AudioPluginInvalidFilter.dll
Resource
win10-20220812-en
Behavioral task
behavioral12
Sample
VRChat_Data/Plugins/x86_64/AudioPluginOculusSpatializer.dll
Resource
win10-20220812-en
Behavioral task
behavioral13
Sample
VRChat_Data/Plugins/x86_64/EOSSDK-Win64-Shipping.dll
Resource
win10-20220901-en
Behavioral task
behavioral14
Sample
VRChat_Data/Plugins/x86_64/KinectUnityAddin.dll
Resource
win10-20220812-en
Behavioral task
behavioral15
Sample
VRChat_Data/Plugins/x86_64/NativeProcess.dll
Resource
win10-20220812-en
Behavioral task
behavioral16
Sample
VRChat_Data/il2cpp_data/etc/mono/2.0/DefaultWsdlHelpGenerator.js
Resource
win10-20220901-en
Behavioral task
behavioral17
Sample
VRChat_Data/il2cpp_data/etc/mono/2.0/machine.xml
Resource
win10-20220812-en
Behavioral task
behavioral18
Sample
VRChat_Data/il2cpp_data/etc/mono/2.0/settings.xml
Resource
win10-20220812-en
Behavioral task
behavioral19
Sample
VRChat_Data/il2cpp_data/etc/mono/2.0/web.xml
Resource
win10-20220812-en
Behavioral task
behavioral20
Sample
VRChat_Data/il2cpp_data/etc/mono/4.0/DefaultWsdlHelpGenerator.js
Resource
win10-20220812-en
Behavioral task
behavioral21
Sample
VRChat_Data/il2cpp_data/etc/mono/4.0/machine.xml
Resource
win10-20220812-en
Behavioral task
behavioral22
Sample
VRChat_Data/il2cpp_data/etc/mono/4.0/settings.xml
Resource
win10-20220812-en
Behavioral task
behavioral23
Sample
VRChat_Data/il2cpp_data/etc/mono/4.0/web.xml
Resource
win10-20220812-en
Behavioral task
behavioral24
Sample
VRChat_Data/il2cpp_data/etc/mono/4.5/DefaultWsdlHelpGenerator.js
Resource
win10-20220812-en
Behavioral task
behavioral25
Sample
VRChat_Data/il2cpp_data/etc/mono/4.5/machine.xml
Resource
win10-20220812-en
Behavioral task
behavioral26
Sample
VRChat_Data/il2cpp_data/etc/mono/4.5/settings.xml
Resource
win10-20220812-en
Behavioral task
behavioral27
Sample
VRChat_Data/il2cpp_data/etc/mono/4.5/web.xml
Resource
win10-20220812-en
Behavioral task
behavioral28
Sample
install.exe
Resource
win10-20220812-en
Behavioral task
behavioral29
Sample
launch.exe
Resource
win10-20220812-en
Behavioral task
behavioral30
Sample
start_protected_game.exe
Resource
win10-20220812-en
Behavioral task
behavioral31
Sample
shrek/bin/test (1).dll
Resource
win10-20220901-en
Behavioral task
behavioral32
Sample
shrek/bin/vxcs injector.exe
Resource
win10-20220901-en
General
-
Target
VRChat_Data/il2cpp_data/etc/mono/4.5/machine.xml
-
Size
33KB
-
MD5
0869544722561f5aff0eefc83fc7b001
-
SHA1
1e118f4b5c1c6a7b1858e3fccb1b1d1095561976
-
SHA256
ef9b9387168fd1dd6c996f96c134d9c44f8eb06f9587004bf997252a520182d6
-
SHA512
ced7c9a5363cabdb87b01ed6b4ca190a690640dddf5cbcc0438acdc611a8ee942cb6cd73c78d3fc2d59f70171f22ac832a10b1e23758dc92599ee24acd978ac2
-
SSDEEP
384:PbtltttttSRtNRtcRtGrRtSRtTf5Rt70zDgRt2Rtuj4f1RDRty6ugyunHMSeuWuh:dkn
Malware Config
Signatures
-
Processes:
iexplore.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E8FE0955-6C58-11ED-A973-7AC0888F8496} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Recovery\PendingDelete iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Recovery\PendingDelete\C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{E8FE0957-6C58-11ED-A973-7AC0888F8496}.dat = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
iexplore.exepid process 2912 iexplore.exe 2912 iexplore.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
MSOXMLED.EXEiexplore.exedescription pid process target process PID 2532 wrote to memory of 2912 2532 MSOXMLED.EXE iexplore.exe PID 2532 wrote to memory of 2912 2532 MSOXMLED.EXE iexplore.exe PID 2912 wrote to memory of 3988 2912 iexplore.exe IEXPLORE.EXE PID 2912 wrote to memory of 3988 2912 iexplore.exe IEXPLORE.EXE PID 2912 wrote to memory of 3988 2912 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE"C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\VRChat_Data\il2cpp_data\etc\mono\4.5\machine.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\VRChat_Data\il2cpp_data\etc\mono\4.5\machine.xml2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2912 CREDAT:82945 /prefetch:23⤵PID:3988