Analysis
-
max time kernel
251s -
max time network
257s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 21:30
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://w3g3a5v6.ssl.hwcdn.net/upload2/game/407507/1377523?GoogleAccessId=uploader@moonscript2.iam.gserviceaccount.com&Expires=1670275799&Signature=QvRfHBVOq2F3ZeXWCZtSUBcGchhVAwIi%2FvJZ6Dobam94KmqNhYo%2BL8iztCTnaWWUtbOZ0eMm677cwIO9RCceH1FA3N26cO2dV39OSg397E1pbX6RohQZvM6leSNXVzuuarr5WHTsisAJfEAw4xLzwGOy6D2LrwuurwYYE%2BXaxiQT8jtKYNRaT6YUCM%2BRr7eD05YomPJGbETrmEcxjxbvZ3hfCde2C21rbzHJfUb6MHVww6RC0OlXGOzjMK%2Fta9y0RfzA%2FN5Rj7ZiOkUbHytIFsyCw%2BeSVWikc4VhoQi648%2FZlOgJJkDt1tnKWdncrQPjaYZk9qGJYwcFQ%2BPA9eYwCw==&hwexp=1670276059&hwsig=1c35d26e60f2fe2c1da3ec69489c18fb
Resource
win10v2004-20220812-en
General
-
Target
https://w3g3a5v6.ssl.hwcdn.net/upload2/game/407507/1377523?GoogleAccessId=uploader@moonscript2.iam.gserviceaccount.com&Expires=1670275799&Signature=QvRfHBVOq2F3ZeXWCZtSUBcGchhVAwIi%2FvJZ6Dobam94KmqNhYo%2BL8iztCTnaWWUtbOZ0eMm677cwIO9RCceH1FA3N26cO2dV39OSg397E1pbX6RohQZvM6leSNXVzuuarr5WHTsisAJfEAw4xLzwGOy6D2LrwuurwYYE%2BXaxiQT8jtKYNRaT6YUCM%2BRr7eD05YomPJGbETrmEcxjxbvZ3hfCde2C21rbzHJfUb6MHVww6RC0OlXGOzjMK%2Fta9y0RfzA%2FN5Rj7ZiOkUbHytIFsyCw%2BeSVWikc4VhoQi648%2FZlOgJJkDt1tnKWdncrQPjaYZk9qGJYwcFQ%2BPA9eYwCw==&hwexp=1670276059&hwsig=1c35d26e60f2fe2c1da3ec69489c18fb
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Five nights at Freddy's 4 VR.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Five nights at Freddy's 4 VR.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Five nights at Freddy's 4 VR.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Five nights at Freddy's 4 VR.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4428 chrome.exe 4428 chrome.exe 1612 chrome.exe 1612 chrome.exe 4872 chrome.exe 4872 chrome.exe 4868 chrome.exe 4868 chrome.exe 3872 chrome.exe 3872 chrome.exe 4080 chrome.exe 4080 chrome.exe 2132 chrome.exe 2132 chrome.exe 4868 Five nights at Freddy's 4 VR.exe 4868 Five nights at Freddy's 4 VR.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1712 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1712 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 47 IoCs
pid Process 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4868 Five nights at Freddy's 4 VR.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1612 wrote to memory of 2732 1612 chrome.exe 80 PID 1612 wrote to memory of 2732 1612 chrome.exe 80 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4896 1612 chrome.exe 83 PID 1612 wrote to memory of 4428 1612 chrome.exe 84 PID 1612 wrote to memory of 4428 1612 chrome.exe 84 PID 1612 wrote to memory of 1988 1612 chrome.exe 85 PID 1612 wrote to memory of 1988 1612 chrome.exe 85 PID 1612 wrote to memory of 1988 1612 chrome.exe 85 PID 1612 wrote to memory of 1988 1612 chrome.exe 85 PID 1612 wrote to memory of 1988 1612 chrome.exe 85 PID 1612 wrote to memory of 1988 1612 chrome.exe 85 PID 1612 wrote to memory of 1988 1612 chrome.exe 85 PID 1612 wrote to memory of 1988 1612 chrome.exe 85 PID 1612 wrote to memory of 1988 1612 chrome.exe 85 PID 1612 wrote to memory of 1988 1612 chrome.exe 85 PID 1612 wrote to memory of 1988 1612 chrome.exe 85 PID 1612 wrote to memory of 1988 1612 chrome.exe 85 PID 1612 wrote to memory of 1988 1612 chrome.exe 85 PID 1612 wrote to memory of 1988 1612 chrome.exe 85 PID 1612 wrote to memory of 1988 1612 chrome.exe 85 PID 1612 wrote to memory of 1988 1612 chrome.exe 85 PID 1612 wrote to memory of 1988 1612 chrome.exe 85 PID 1612 wrote to memory of 1988 1612 chrome.exe 85 PID 1612 wrote to memory of 1988 1612 chrome.exe 85 PID 1612 wrote to memory of 1988 1612 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://w3g3a5v6.ssl.hwcdn.net/upload2/game/407507/1377523?GoogleAccessId=uploader@moonscript2.iam.gserviceaccount.com&Expires=1670275799&Signature=QvRfHBVOq2F3ZeXWCZtSUBcGchhVAwIi%2FvJZ6Dobam94KmqNhYo%2BL8iztCTnaWWUtbOZ0eMm677cwIO9RCceH1FA3N26cO2dV39OSg397E1pbX6RohQZvM6leSNXVzuuarr5WHTsisAJfEAw4xLzwGOy6D2LrwuurwYYE%2BXaxiQT8jtKYNRaT6YUCM%2BRr7eD05YomPJGbETrmEcxjxbvZ3hfCde2C21rbzHJfUb6MHVww6RC0OlXGOzjMK%2Fta9y0RfzA%2FN5Rj7ZiOkUbHytIFsyCw%2BeSVWikc4VhoQi648%2FZlOgJJkDt1tnKWdncrQPjaYZk9qGJYwcFQ%2BPA9eYwCw==&hwexp=1670276059&hwsig=1c35d26e60f2fe2c1da3ec69489c18fb1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa68a94f50,0x7ffa68a94f60,0x7ffa68a94f702⤵PID:2732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1572,3046484898717601676,2263114001764083944,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1612 /prefetch:22⤵PID:4896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1572,3046484898717601676,2263114001764083944,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1984 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1572,3046484898717601676,2263114001764083944,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2300 /prefetch:82⤵PID:1988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,3046484898717601676,2263114001764083944,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2928 /prefetch:12⤵PID:868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,3046484898717601676,2263114001764083944,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2944 /prefetch:12⤵PID:1504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,3046484898717601676,2263114001764083944,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4588 /prefetch:82⤵PID:4316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,3046484898717601676,2263114001764083944,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4992 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,3046484898717601676,2263114001764083944,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4548 /prefetch:82⤵PID:3540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,3046484898717601676,2263114001764083944,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4628 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,3046484898717601676,2263114001764083944,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4764 /prefetch:82⤵PID:916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1572,3046484898717601676,2263114001764083944,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5680 /prefetch:82⤵PID:4824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,3046484898717601676,2263114001764083944,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1104 /prefetch:82⤵PID:3564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,3046484898717601676,2263114001764083944,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,3046484898717601676,2263114001764083944,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4280 /prefetch:82⤵PID:1144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1572,3046484898717601676,2263114001764083944,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5268 /prefetch:82⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1572,3046484898717601676,2263114001764083944,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1468 /prefetch:12⤵PID:1108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1572,3046484898717601676,2263114001764083944,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4688 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,3046484898717601676,2263114001764083944,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2680 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2132
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4020
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4020
-
C:\Users\Admin\Downloads\Five nights at Freddy's 4 VR\Five nights at Freddy's 4 VR\Five nights at Freddy's 4 VR.exe"C:\Users\Admin\Downloads\Five nights at Freddy's 4 VR\Five nights at Freddy's 4 VR\Five nights at Freddy's 4 VR.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4868 -
C:\Users\Admin\Downloads\Five nights at Freddy's 4 VR\Five nights at Freddy's 4 VR\UnityCrashHandler64.exe"C:\Users\Admin\Downloads\Five nights at Freddy's 4 VR\Five nights at Freddy's 4 VR\UnityCrashHandler64.exe" --attach 4868 17852961300482⤵PID:3908
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x450 0x4b01⤵
- Suspicious use of AdjustPrivilegeToken
PID:1712