Analysis

  • max time kernel
    139s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25-01-2023 11:27

General

  • Target

    LDPlayer4_ens_1397_ld.exe

  • Size

    3.2MB

  • MD5

    4d8a60c6e654bd38212cebf3d17e5d38

  • SHA1

    9911ab18310d400ba4698a97c591e3893a7e3400

  • SHA256

    81d727fad8ac4fc925ac7ea6678d1a537269da092a6918d1caaa59cebc81c525

  • SHA512

    cdcf9e75843019a0291af3ee5b1b0aa8fbe655112a7835b8b45331f79ea9a6ec01290e9f523c2b6781cca88006cbfe14bb1076d178f3d49767965924db062d2c

  • SSDEEP

    49152:jXRnyhw3Us74CvY1UjAbDiYppI4ubHDcaR9sXafgkDFMVR9C1UhPJXMK701hOHZJ:jVmZs7y1U8pp/6D4BiCV2Hib

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 7 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LDPlayer4_ens_1397_ld.exe
    "C:\Users\Admin\AppData\Local\Temp\LDPlayer4_ens_1397_ld.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill" /F /IM dnplayer.exe /T
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1472
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill" /F /IM dnmultiplayer.exe /T
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1952
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill" /F /IM dnupdate.exe /T
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1716
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill" /F /IM bugreport.exe /T
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1660
    • C:\LDPlayer\LDPlayer4.0\LDPlayer.exe
      "C:\LDPlayer\LDPlayer4.0\\LDPlayer.exe" -downloader -openid=1397 -language=en -path="C:\LDPlayer\LDPlayer4.0\" -silence
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1784
      • C:\Windows\SysWOW64\taskkill.exe
        "C:\Windows\System32\taskkill.exe" /F /IM dnmultiplayerex.exe /T
        3⤵
        • Kills process with taskkill
        PID:1112
      • C:\Windows\SysWOW64\taskkill.exe
        "taskkill" /F /IM fynews.exe
        3⤵
        • Kills process with taskkill
        PID:1204
      • C:\Windows\SysWOW64\taskkill.exe
        "taskkill" /F /IM ldnews.exe
        3⤵
        • Kills process with taskkill
        PID:548

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\LDPlayer\LDPlayer4.0\LDPlayer.exe
    Filesize

    469.8MB

    MD5

    dcae786c10e02d832428f3ef16582a7c

    SHA1

    0a31716df4c8a4942a81358e9200bb7e614c0e54

    SHA256

    3720270b1d8aa3a6f25d29de5609280ffc4a9766f368c34d9ea006303fea0d7b

    SHA512

    7a51279e1b92f2e7ef39c5cff67bebf194d4ef3f6eec8186f7fc6c86a58f764f7e4b1c05909057051ff045fdd9e86cff7c315fb75b18b454c51c99e99fcfc4dc

  • \LDPlayer\LDPlayer4.0\LDPlayer.exe
    Filesize

    469.8MB

    MD5

    dcae786c10e02d832428f3ef16582a7c

    SHA1

    0a31716df4c8a4942a81358e9200bb7e614c0e54

    SHA256

    3720270b1d8aa3a6f25d29de5609280ffc4a9766f368c34d9ea006303fea0d7b

    SHA512

    7a51279e1b92f2e7ef39c5cff67bebf194d4ef3f6eec8186f7fc6c86a58f764f7e4b1c05909057051ff045fdd9e86cff7c315fb75b18b454c51c99e99fcfc4dc

  • \Users\Admin\AppData\Local\Temp\Setup\ds.dll
    Filesize

    62KB

    MD5

    2204cba332566d808353f256bd211595

    SHA1

    8da4d578601335c86a3c0b432d37011da316b6cc

    SHA256

    305c66014595e119140102a83fde0928b46902f7b5bd358cbfaf06145964ca3e

    SHA512

    ab58f9a6b6171a87eddddcfd11b49708269f33ab0f9f8406202eedb21c873aa2a38234f51f0b073ea84f7a182aff82b8e0596fb61400ffbc8d873fed7475fe7a

  • \Users\Admin\AppData\Local\Temp\Setup\ds.dll
    Filesize

    62KB

    MD5

    2204cba332566d808353f256bd211595

    SHA1

    8da4d578601335c86a3c0b432d37011da316b6cc

    SHA256

    305c66014595e119140102a83fde0928b46902f7b5bd358cbfaf06145964ca3e

    SHA512

    ab58f9a6b6171a87eddddcfd11b49708269f33ab0f9f8406202eedb21c873aa2a38234f51f0b073ea84f7a182aff82b8e0596fb61400ffbc8d873fed7475fe7a

  • \Users\Admin\AppData\Local\Temp\Setup\ds.dll
    Filesize

    62KB

    MD5

    2204cba332566d808353f256bd211595

    SHA1

    8da4d578601335c86a3c0b432d37011da316b6cc

    SHA256

    305c66014595e119140102a83fde0928b46902f7b5bd358cbfaf06145964ca3e

    SHA512

    ab58f9a6b6171a87eddddcfd11b49708269f33ab0f9f8406202eedb21c873aa2a38234f51f0b073ea84f7a182aff82b8e0596fb61400ffbc8d873fed7475fe7a

  • memory/548-71-0x0000000000000000-mapping.dmp
  • memory/1112-69-0x0000000000000000-mapping.dmp
  • memory/1204-70-0x0000000000000000-mapping.dmp
  • memory/1472-61-0x0000000000000000-mapping.dmp
  • memory/1660-64-0x0000000000000000-mapping.dmp
  • memory/1716-63-0x0000000000000000-mapping.dmp
  • memory/1756-60-0x0000000004475000-0x0000000004486000-memory.dmp
    Filesize

    68KB

  • memory/1756-54-0x0000000076411000-0x0000000076413000-memory.dmp
    Filesize

    8KB

  • memory/1756-59-0x00000000035E0000-0x0000000003624000-memory.dmp
    Filesize

    272KB

  • memory/1756-58-0x0000000002B40000-0x0000000002B54000-memory.dmp
    Filesize

    80KB

  • memory/1784-66-0x0000000000000000-mapping.dmp
  • memory/1952-62-0x0000000000000000-mapping.dmp