Overview
overview
10Static
static
10publish/OpenAL32.dll
windows7-x64
1publish/OpenAL32.dll
windows10-2004-x64
1publish/Ry...ll.xml
windows7-x64
1publish/Ry...ll.xml
windows10-2004-x64
1publish/Ryujinx.exe
windows7-x64
3publish/Ryujinx.exe
windows10-2004-x64
7publish/SDL2.dll
windows7-x64
1publish/SDL2.dll
windows10-2004-x64
1publish/av...59.dll
windows7-x64
1publish/av...59.dll
windows10-2004-x64
1publish/avutil-57.dll
windows7-x64
3publish/avutil-57.dll
windows10-2004-x64
3publish/bi...-0.dll
windows7-x64
3publish/bi...-0.dll
windows10-2004-x64
3publish/bi...-1.dll
windows7-x64
3publish/bi...-1.dll
windows10-2004-x64
3publish/bi...-2.dll
windows7-x64
1publish/bi...-2.dll
windows10-2004-x64
3publish/bi...-2.dll
windows7-x64
1publish/bi...-2.dll
windows10-2004-x64
1publish/bi...-3.dll
windows7-x64
3publish/bi...-3.dll
windows10-2004-x64
3publish/sh...ic.xml
windows7-x64
1publish/sh...ic.xml
windows10-2004-x64
1publish/sh...ic.xml
windows7-x64
1publish/sh...ic.xml
windows10-2004-x64
1publish/sh...ic.xml
windows7-x64
1publish/sh...ic.xml
windows10-2004-x64
1publish/sh...ic.xml
windows7-x64
1publish/sh...ic.xml
windows10-2004-x64
1publish/sh...tl.xml
windows7-x64
1publish/sh...tl.xml
windows10-2004-x64
1Analysis
-
max time kernel
110s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30-12-2022 02:47
Behavioral task
behavioral1
Sample
publish/OpenAL32.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
publish/OpenAL32.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
publish/Ryujinx.SDL2.Common.dll.xml
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
publish/Ryujinx.SDL2.Common.dll.xml
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
publish/Ryujinx.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
publish/Ryujinx.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
publish/SDL2.dll
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
publish/SDL2.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
publish/avcodec-59.dll
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
publish/avcodec-59.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
publish/avutil-57.dll
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
publish/avutil-57.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral13
Sample
publish/bin/libatk-1.0-0.dll
Resource
win7-20220901-en
Behavioral task
behavioral14
Sample
publish/bin/libatk-1.0-0.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
publish/bin/libbz2-1.dll
Resource
win7-20221111-en
Behavioral task
behavioral16
Sample
publish/bin/libbz2-1.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
publish/bin/libcairo-2.dll
Resource
win7-20221111-en
Behavioral task
behavioral18
Sample
publish/bin/libcairo-2.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
publish/bin/libcairo-gobject-2.dll
Resource
win7-20221111-en
Behavioral task
behavioral20
Sample
publish/bin/libcairo-gobject-2.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral21
Sample
publish/bin/libcroco-0.6-3.dll
Resource
win7-20220812-en
Behavioral task
behavioral22
Sample
publish/bin/libcroco-0.6-3.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral23
Sample
publish/share/icons/Adwaita/scalable/categories/emoji-nature-symbolic.xml
Resource
win7-20221111-en
Behavioral task
behavioral24
Sample
publish/share/icons/Adwaita/scalable/categories/emoji-nature-symbolic.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
publish/share/icons/Adwaita/scalable/devices/phone-old-symbolic.xml
Resource
win7-20221111-en
Behavioral task
behavioral26
Sample
publish/share/icons/Adwaita/scalable/devices/phone-old-symbolic.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
publish/share/icons/Adwaita/scalable/mimetypes/inode-directory-symbolic.xml
Resource
win7-20220901-en
Behavioral task
behavioral28
Sample
publish/share/icons/Adwaita/scalable/mimetypes/inode-directory-symbolic.xml
Resource
win10v2004-20221111-en
Behavioral task
behavioral29
Sample
publish/share/icons/Adwaita/scalable/status/non-starred-symbolic.xml
Resource
win7-20220812-en
Behavioral task
behavioral30
Sample
publish/share/icons/Adwaita/scalable/status/non-starred-symbolic.xml
Resource
win10v2004-20221111-en
Behavioral task
behavioral31
Sample
publish/share/icons/Adwaita/scalable/status/semi-starred-symbolic-rtl.xml
Resource
win7-20220812-en
Behavioral task
behavioral32
Sample
publish/share/icons/Adwaita/scalable/status/semi-starred-symbolic-rtl.xml
Resource
win10v2004-20221111-en
General
-
Target
publish/share/icons/Adwaita/scalable/mimetypes/inode-directory-symbolic.xml
-
Size
3KB
-
MD5
1a9526bce4500770dc9da3fac276de77
-
SHA1
8e3be08d46567e15b0d7beb9c749ff361d61aedc
-
SHA256
4698902117a08b3a216ec9187382b94d85d23ba1230497b823bc4f0398301b3d
-
SHA512
2860804f3b03574b29679fc070f167cb7c4c5b69f7cd0352bc68f74c665e5075dcb543441bd424dac29b04205456f6d26ccab021b1bc879fd41a5819598e824d
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "379133562" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9B6710C1-87EC-11ED-A20B-4279513DF160} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 506bf770f91bd901 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000059c89598554fc14e87c07c6eeedc42c600000000020000000000106600000001000020000000f3caa61e81100ec2646d41a0a8de03eaf0216576603b3cc95235abd5c426959a000000000e800000000200002000000092afd67dfc1c410695295b2f5120b6d1c85cb9d10ec56a018bf0a775313fa7b5200000005f326815ee108d8dc8f6114daee95a770aa059be458834f2f24eb095f1e28f364000000031f45c1eee20cea2e738afdce7fedc722cd2cffe9053f498f6fa0eb46528c78ae8edf4e4badb490c51ca434f2b7758f4422ebcd34a71a12e9f3b02b7b54228b8 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 560 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 560 IEXPLORE.EXE 560 IEXPLORE.EXE 1276 IEXPLORE.EXE 1276 IEXPLORE.EXE 1276 IEXPLORE.EXE 1276 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 980 wrote to memory of 2028 980 MSOXMLED.EXE 28 PID 980 wrote to memory of 2028 980 MSOXMLED.EXE 28 PID 980 wrote to memory of 2028 980 MSOXMLED.EXE 28 PID 980 wrote to memory of 2028 980 MSOXMLED.EXE 28 PID 2028 wrote to memory of 560 2028 iexplore.exe 29 PID 2028 wrote to memory of 560 2028 iexplore.exe 29 PID 2028 wrote to memory of 560 2028 iexplore.exe 29 PID 2028 wrote to memory of 560 2028 iexplore.exe 29 PID 560 wrote to memory of 1276 560 IEXPLORE.EXE 30 PID 560 wrote to memory of 1276 560 IEXPLORE.EXE 30 PID 560 wrote to memory of 1276 560 IEXPLORE.EXE 30 PID 560 wrote to memory of 1276 560 IEXPLORE.EXE 30
Processes
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\publish\share\icons\Adwaita\scalable\mimetypes\inode-directory-symbolic.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome2⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:560 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1276
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
603B
MD5231d7bf35738756376f08f3a02024f49
SHA1dd542ffc5a05dd4776d1ce3adc95b37325ed5b7b
SHA256da738c858aa32dc26f2cea8d9a44915500d600ab4a0d17a2d70b076859c28ae9
SHA512eeb84113ee6f54337266178ffb9de997e726e8f31fd7523a9d78fb9dab4f9302fd012bb00f65a17e9a4b17a8de4f70f9d839a55c943d5c9fb262b381a470479d