Resubmissions

30-01-2023 23:01

230130-2zzp1seg4y 8

30-01-2023 22:54

230130-2vx1madb46 8

Analysis

  • max time kernel
    149s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    30-01-2023 22:54

General

  • Target

    LDPlayer9_es_2281_Cj0KCQiA8t2eBhDeARIsAAVEga27CI2Y_lOWhKJruTM6Tt539XBBIFXqrs4ULzH29iHDJwilBjaiAkQaApNzEALw_wcB_ld.exe

  • Size

    3.6MB

  • MD5

    90276982cc921f646f74f8310ef8cd6a

  • SHA1

    37d5ff4e70485bbcc6e4ef6fa08d3b7839012d0f

  • SHA256

    08fee35f2462f93c96751755ff42f2f63525ad04e21543efe52a159c800ab80a

  • SHA512

    bdbdb26aaae5b84e7c8298e5e6033142f872e8f25578274c3a8c8fdc7d1e07033be62760b5230a67696bf9f4d885a7187d17680b271e713f1f1a111fa37edf2c

  • SSDEEP

    49152:KpiUPlcfO74zHK+1ULjFvnxe2T9g4tGOPf28xuYT:KpPNcG74r1ULxvxew9g1op

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Kills process with taskkill 4 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LDPlayer9_es_2281_Cj0KCQiA8t2eBhDeARIsAAVEga27CI2Y_lOWhKJruTM6Tt539XBBIFXqrs4ULzH29iHDJwilBjaiAkQaApNzEALw_wcB_ld.exe
    "C:\Users\Admin\AppData\Local\Temp\LDPlayer9_es_2281_Cj0KCQiA8t2eBhDeARIsAAVEga27CI2Y_lOWhKJruTM6Tt539XBBIFXqrs4ULzH29iHDJwilBjaiAkQaApNzEALw_wcB_ld.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1244
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill" /F /IM dnplayer.exe /T
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1640
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill" /F /IM dnmultiplayer.exe /T
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:948
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill" /F /IM dnupdate.exe /T
      2⤵
      • Kills process with taskkill
      PID:1084
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill" /F /IM bugreport.exe /T
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:524
    • C:\LDPlayer\LDPlayer9\LDPlayer.exe
      "C:\LDPlayer\LDPlayer9\\LDPlayer.exe" -downloader -openid=2281 -language=es -path="C:\LDPlayer\LDPlayer9\" -googleid=Cj0KCQiA8t2eBhDeARIsAAVEga27CI2Y_lOWhKJruTM6Tt539XBBIFXqrs4ULzH29iHDJwilBjaiAkQaApNzEALw_wcB -silence
      2⤵
      • Executes dropped EXE
      PID:1512

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\LDPlayer\LDPlayer9\LDPlayer.exe

    Filesize

    174.2MB

    MD5

    4c5b34c6db75eab5d0a5f29766967f6e

    SHA1

    3cb87fbbe406040240997ed9e9a04815de8a9ff6

    SHA256

    765addaeffec1535289c31604d9a7c96531e29f289ed02bec2c805cadcbd34a3

    SHA512

    80d732fecaa64f160fdb40254bc86969a3915d3891f2b699e2f2fd5f91bced1d4fbcfdd883bfcbf7496ab2b6e406ace15c0d771d2d6e8645fe4f67dd4008d2af

  • \LDPlayer\LDPlayer9\LDPlayer.exe

    Filesize

    174.2MB

    MD5

    8e59604ff8bb7f8ce61f237ebe34b89a

    SHA1

    7c8898ddda4417ba12d580b37ca2887b35c6e098

    SHA256

    59bd74a5c0cffb82461e79938d83422f0457cdfda989fb66c168976ac2e137c4

    SHA512

    c8d7df07c8650a6fc111f6b09209ca7dad1a3496f9a03afb5bcec8c0c39b4bcf637340335e7257c7791d7bf1f7166fde53bded4431a758f1a54c99e62e2761d4

  • \Users\Admin\AppData\Local\Temp\Setup\ds.dll

    Filesize

    62KB

    MD5

    2204cba332566d808353f256bd211595

    SHA1

    8da4d578601335c86a3c0b432d37011da316b6cc

    SHA256

    305c66014595e119140102a83fde0928b46902f7b5bd358cbfaf06145964ca3e

    SHA512

    ab58f9a6b6171a87eddddcfd11b49708269f33ab0f9f8406202eedb21c873aa2a38234f51f0b073ea84f7a182aff82b8e0596fb61400ffbc8d873fed7475fe7a

  • \Users\Admin\AppData\Local\Temp\Setup\ds.dll

    Filesize

    62KB

    MD5

    2204cba332566d808353f256bd211595

    SHA1

    8da4d578601335c86a3c0b432d37011da316b6cc

    SHA256

    305c66014595e119140102a83fde0928b46902f7b5bd358cbfaf06145964ca3e

    SHA512

    ab58f9a6b6171a87eddddcfd11b49708269f33ab0f9f8406202eedb21c873aa2a38234f51f0b073ea84f7a182aff82b8e0596fb61400ffbc8d873fed7475fe7a

  • \Users\Admin\AppData\Local\Temp\Setup\ds.dll

    Filesize

    62KB

    MD5

    2204cba332566d808353f256bd211595

    SHA1

    8da4d578601335c86a3c0b432d37011da316b6cc

    SHA256

    305c66014595e119140102a83fde0928b46902f7b5bd358cbfaf06145964ca3e

    SHA512

    ab58f9a6b6171a87eddddcfd11b49708269f33ab0f9f8406202eedb21c873aa2a38234f51f0b073ea84f7a182aff82b8e0596fb61400ffbc8d873fed7475fe7a

  • memory/1244-54-0x0000000076AE1000-0x0000000076AE3000-memory.dmp

    Filesize

    8KB

  • memory/1244-60-0x0000000004655000-0x0000000004666000-memory.dmp

    Filesize

    68KB

  • memory/1244-59-0x0000000000E90000-0x0000000000ED4000-memory.dmp

    Filesize

    272KB

  • memory/1244-58-0x0000000002760000-0x0000000002774000-memory.dmp

    Filesize

    80KB