Overview
overview
3Static
static
fnia3d-1.1.0.zip
windows7-x64
1fnia3d-1.1.0.zip
windows10-2004-x64
1Five Night....0.exe
windows7-x64
1Five Night....0.exe
windows10-2004-x64
1data.win
windows7-x64
3data.win
windows10-2004-x64
3display_mo...ck.dll
windows7-x64
1display_mo...ck.dll
windows10-2004-x64
1options.ini
windows7-x64
1options.ini
windows10-2004-x64
1Analysis
-
max time kernel
172s -
max time network
179s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02/02/2023, 01:12
Static task
static1
Behavioral task
behavioral1
Sample
fnia3d-1.1.0.zip
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fnia3d-1.1.0.zip
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
Five Nights in Anime 3D 1.1.0.exe
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
Five Nights in Anime 3D 1.1.0.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
data.win
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
data.win
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
display_mouse_lock.dll
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
display_mouse_lock.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral9
Sample
options.ini
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
options.ini
Resource
win10v2004-20220812-en
General
-
Target
fnia3d-1.1.0.zip
-
Size
175.6MB
-
MD5
fd7f3323cde653b29b5f1c37418599f1
-
SHA1
370c3d28ffaeeb18bcafe365092b4479447e8bb4
-
SHA256
7c46038c39d5e574738069256bc30cf86675bcabea0905b97f92b8be1bffa58d
-
SHA512
96cfd052a32ab15af7a7d2815f2f9487eed97ed68a5f97bc6cd609a63e625371a818a2013bbe9ae0e3a1144c7a38523df7d0b945b99d38a40eaf06d2f3ef390e
-
SSDEEP
3145728:2PEenrTsTaK6c/+JGFiRddfLZI4iVDE+GCAc9MClcuRDs7mFBER5oD9swmoMJTSV:6tnHwaKF/aX/djZDimtCAcdQIBEkD9G4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1756 chrome.exe 1660 chrome.exe 1660 chrome.exe 2420 chrome.exe 2428 chrome.exe 1660 chrome.exe 1660 chrome.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1840 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1840 AUDIODG.EXE Token: 33 1840 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1840 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1660 wrote to memory of 1588 1660 chrome.exe 32 PID 1660 wrote to memory of 1588 1660 chrome.exe 32 PID 1660 wrote to memory of 1588 1660 chrome.exe 32 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 840 1660 chrome.exe 34 PID 1660 wrote to memory of 1756 1660 chrome.exe 33 PID 1660 wrote to memory of 1756 1660 chrome.exe 33 PID 1660 wrote to memory of 1756 1660 chrome.exe 33 PID 1660 wrote to memory of 1524 1660 chrome.exe 35 PID 1660 wrote to memory of 1524 1660 chrome.exe 35 PID 1660 wrote to memory of 1524 1660 chrome.exe 35 PID 1660 wrote to memory of 1524 1660 chrome.exe 35 PID 1660 wrote to memory of 1524 1660 chrome.exe 35 PID 1660 wrote to memory of 1524 1660 chrome.exe 35 PID 1660 wrote to memory of 1524 1660 chrome.exe 35 PID 1660 wrote to memory of 1524 1660 chrome.exe 35 PID 1660 wrote to memory of 1524 1660 chrome.exe 35 PID 1660 wrote to memory of 1524 1660 chrome.exe 35 PID 1660 wrote to memory of 1524 1660 chrome.exe 35 PID 1660 wrote to memory of 1524 1660 chrome.exe 35 PID 1660 wrote to memory of 1524 1660 chrome.exe 35 PID 1660 wrote to memory of 1524 1660 chrome.exe 35 PID 1660 wrote to memory of 1524 1660 chrome.exe 35 PID 1660 wrote to memory of 1524 1660 chrome.exe 35 PID 1660 wrote to memory of 1524 1660 chrome.exe 35
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\fnia3d-1.1.0.zip1⤵PID:960
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:316
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5641⤵
- Suspicious use of AdjustPrivilegeToken
PID:1840
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef60e4f50,0x7fef60e4f60,0x7fef60e4f702⤵PID:1588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1108,5685899160847763967,14732875826170955275,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1228 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1108,5685899160847763967,14732875826170955275,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1132 /prefetch:22⤵PID:840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1108,5685899160847763967,14732875826170955275,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1700 /prefetch:82⤵PID:1524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1108,5685899160847763967,14732875826170955275,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2036 /prefetch:12⤵PID:976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1108,5685899160847763967,14732875826170955275,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2084 /prefetch:12⤵PID:960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1108,5685899160847763967,14732875826170955275,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:1512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1108,5685899160847763967,14732875826170955275,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3284 /prefetch:22⤵PID:2076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1108,5685899160847763967,14732875826170955275,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:2120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1108,5685899160847763967,14732875826170955275,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3496 /prefetch:82⤵PID:2200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1108,5685899160847763967,14732875826170955275,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3620 /prefetch:82⤵PID:2212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1108,5685899160847763967,14732875826170955275,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3644 /prefetch:82⤵PID:2312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1108,5685899160847763967,14732875826170955275,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1336 /prefetch:82⤵PID:2364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1108,5685899160847763967,14732875826170955275,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3656 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1108,5685899160847763967,14732875826170955275,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1332 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1108,5685899160847763967,14732875826170955275,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3264 /prefetch:82⤵PID:2436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1108,5685899160847763967,14732875826170955275,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3076 /prefetch:82⤵PID:2572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1108,5685899160847763967,14732875826170955275,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3716 /prefetch:82⤵PID:2612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1108,5685899160847763967,14732875826170955275,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2908 /prefetch:12⤵PID:2684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1108,5685899160847763967,14732875826170955275,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3228 /prefetch:82⤵PID:2860
-