Analysis

  • max time kernel
    138s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    07/02/2023, 11:21

General

  • Target

    horrortale.exe

  • Size

    53.2MB

  • MD5

    eb9ac7947664fdcae1ae6bc504e858f8

  • SHA1

    1d2a0205b4afb2c8c934d7961e6347287e8bfa87

  • SHA256

    5ecd92a0304d8832f1e13364d2bbc4c6b95024eb9429c76246a8fdd588f6a988

  • SHA512

    737237ec5b6344762540c2923466ee45634cd9455ad7cd793b74aa086961d1aafbc79f1210f591c423085d9a5e44eb99f1bf1c3dcdd9b18d6c767536c73a98df

  • SSDEEP

    1572864:B+EGbKFqO6aXZ9x/vzma1n+LS2SfkF+qGcAVjME/0n:BAbkTHpjvzv+DSfk8qGRBd0n

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\horrortale.exe
    "C:\Users\Admin\AppData\Local\Temp\horrortale.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1300
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HORRORTALE.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HORRORTALE.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1356
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1356 -s 420
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:1376
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1884
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefb264f50,0x7fefb264f60,0x7fefb264f70
      2⤵
        PID:1548
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1056,12669212592410183141,14301663863768577427,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1400 /prefetch:8
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1216
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1056,12669212592410183141,14301663863768577427,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1060 /prefetch:2
        2⤵
          PID:1612
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1056,12669212592410183141,14301663863768577427,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1664 /prefetch:8
          2⤵
            PID:1104
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1056,12669212592410183141,14301663863768577427,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2040 /prefetch:1
            2⤵
              PID:1528
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1056,12669212592410183141,14301663863768577427,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2152 /prefetch:1
              2⤵
                PID:1620
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1056,12669212592410183141,14301663863768577427,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:8
                2⤵
                  PID:1684
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1056,12669212592410183141,14301663863768577427,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3300 /prefetch:2
                  2⤵
                    PID:1892
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1056,12669212592410183141,14301663863768577427,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:1
                    2⤵
                      PID:1480
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1056,12669212592410183141,14301663863768577427,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3424 /prefetch:8
                      2⤵
                        PID:2056
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1056,12669212592410183141,14301663863768577427,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3620 /prefetch:8
                        2⤵
                          PID:2064
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1056,12669212592410183141,14301663863768577427,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3880 /prefetch:8
                          2⤵
                            PID:2140
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1056,12669212592410183141,14301663863768577427,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3892 /prefetch:8
                            2⤵
                              PID:2148
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1056,12669212592410183141,14301663863768577427,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1492 /prefetch:8
                              2⤵
                                PID:2240
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1056,12669212592410183141,14301663863768577427,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=792 /prefetch:8
                                2⤵
                                  PID:2296
                                • C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe
                                  "C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe" --reenable-autoupdates --system-level
                                  2⤵
                                    PID:2332
                                    • C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe
                                      "C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x13c,0x140,0x144,0x110,0x148,0x13f3fa890,0x13f3fa8a0,0x13f3fa8b0
                                      3⤵
                                        PID:2364
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1056,12669212592410183141,14301663863768577427,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3556 /prefetch:8
                                      2⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:2352

                                  Network

                                        MITRE ATT&CK Enterprise v6

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HORRORTALE.exe

                                          Filesize

                                          3.1MB

                                          MD5

                                          05d2a8c952cdb5e2348c47ece9535aeb

                                          SHA1

                                          23bbc40ac938b6363f7112b9d3ceee443ce947a2

                                          SHA256

                                          8bda815774afb3e310b9809789e8b5bd1ed4903deb1189290a5fead7295089d3

                                          SHA512

                                          a8c51ca2c611113b29ba537d01af1f119d160d95436ac45ec166e8f9b064ca23c2ee2905a599d05db8defabbbed49288182bf212aea0fdde91957c5971b9a197

                                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HORRORTALE.exe

                                          Filesize

                                          3.1MB

                                          MD5

                                          05d2a8c952cdb5e2348c47ece9535aeb

                                          SHA1

                                          23bbc40ac938b6363f7112b9d3ceee443ce947a2

                                          SHA256

                                          8bda815774afb3e310b9809789e8b5bd1ed4903deb1189290a5fead7295089d3

                                          SHA512

                                          a8c51ca2c611113b29ba537d01af1f119d160d95436ac45ec166e8f9b064ca23c2ee2905a599d05db8defabbbed49288182bf212aea0fdde91957c5971b9a197

                                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3dx9_43.dll

                                          Filesize

                                          1.9MB

                                          MD5

                                          86e39e9161c3d930d93822f1563c280d

                                          SHA1

                                          f5944df4142983714a6d9955e6e393d9876c1e11

                                          SHA256

                                          0b28546be22c71834501f7d7185ede5d79742457331c7ee09efc14490dd64f5f

                                          SHA512

                                          0a3e311c4fd5c2194a8807469e47156af35502e10aeb8a3f64a01ff802cd8669c7e668cc87b593b182fd830a126d002b5d5d7b6c77991158bffdb0b5b997f6b3

                                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\data.win

                                          Filesize

                                          6.7MB

                                          MD5

                                          665b0731330c2542184563c3ba47afed

                                          SHA1

                                          edf35647ff0371b3b6187a16ccc6b61c3febb935

                                          SHA256

                                          cc8d10e5a41f5c25d6686a09ede3090503422649c3232431a0b20d83b10000da

                                          SHA512

                                          95043175c2588362327133d1a1ba9ac6297b04a50e72262b0a761109d95c91440f32603f10d0b6b6dbe626fa1f23e5581ab5b6e27b4a23a84c3e64155b8b2c81

                                        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\D3DX9_43.dll

                                          Filesize

                                          1.9MB

                                          MD5

                                          86e39e9161c3d930d93822f1563c280d

                                          SHA1

                                          f5944df4142983714a6d9955e6e393d9876c1e11

                                          SHA256

                                          0b28546be22c71834501f7d7185ede5d79742457331c7ee09efc14490dd64f5f

                                          SHA512

                                          0a3e311c4fd5c2194a8807469e47156af35502e10aeb8a3f64a01ff802cd8669c7e668cc87b593b182fd830a126d002b5d5d7b6c77991158bffdb0b5b997f6b3

                                        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\HORRORTALE.exe

                                          Filesize

                                          3.1MB

                                          MD5

                                          05d2a8c952cdb5e2348c47ece9535aeb

                                          SHA1

                                          23bbc40ac938b6363f7112b9d3ceee443ce947a2

                                          SHA256

                                          8bda815774afb3e310b9809789e8b5bd1ed4903deb1189290a5fead7295089d3

                                          SHA512

                                          a8c51ca2c611113b29ba537d01af1f119d160d95436ac45ec166e8f9b064ca23c2ee2905a599d05db8defabbbed49288182bf212aea0fdde91957c5971b9a197

                                        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\HORRORTALE.exe

                                          Filesize

                                          3.1MB

                                          MD5

                                          05d2a8c952cdb5e2348c47ece9535aeb

                                          SHA1

                                          23bbc40ac938b6363f7112b9d3ceee443ce947a2

                                          SHA256

                                          8bda815774afb3e310b9809789e8b5bd1ed4903deb1189290a5fead7295089d3

                                          SHA512

                                          a8c51ca2c611113b29ba537d01af1f119d160d95436ac45ec166e8f9b064ca23c2ee2905a599d05db8defabbbed49288182bf212aea0fdde91957c5971b9a197

                                        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\HORRORTALE.exe

                                          Filesize

                                          3.1MB

                                          MD5

                                          05d2a8c952cdb5e2348c47ece9535aeb

                                          SHA1

                                          23bbc40ac938b6363f7112b9d3ceee443ce947a2

                                          SHA256

                                          8bda815774afb3e310b9809789e8b5bd1ed4903deb1189290a5fead7295089d3

                                          SHA512

                                          a8c51ca2c611113b29ba537d01af1f119d160d95436ac45ec166e8f9b064ca23c2ee2905a599d05db8defabbbed49288182bf212aea0fdde91957c5971b9a197

                                        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\HORRORTALE.exe

                                          Filesize

                                          3.1MB

                                          MD5

                                          05d2a8c952cdb5e2348c47ece9535aeb

                                          SHA1

                                          23bbc40ac938b6363f7112b9d3ceee443ce947a2

                                          SHA256

                                          8bda815774afb3e310b9809789e8b5bd1ed4903deb1189290a5fead7295089d3

                                          SHA512

                                          a8c51ca2c611113b29ba537d01af1f119d160d95436ac45ec166e8f9b064ca23c2ee2905a599d05db8defabbbed49288182bf212aea0fdde91957c5971b9a197

                                        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\HORRORTALE.exe

                                          Filesize

                                          3.1MB

                                          MD5

                                          05d2a8c952cdb5e2348c47ece9535aeb

                                          SHA1

                                          23bbc40ac938b6363f7112b9d3ceee443ce947a2

                                          SHA256

                                          8bda815774afb3e310b9809789e8b5bd1ed4903deb1189290a5fead7295089d3

                                          SHA512

                                          a8c51ca2c611113b29ba537d01af1f119d160d95436ac45ec166e8f9b064ca23c2ee2905a599d05db8defabbbed49288182bf212aea0fdde91957c5971b9a197

                                        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\HORRORTALE.exe

                                          Filesize

                                          3.1MB

                                          MD5

                                          05d2a8c952cdb5e2348c47ece9535aeb

                                          SHA1

                                          23bbc40ac938b6363f7112b9d3ceee443ce947a2

                                          SHA256

                                          8bda815774afb3e310b9809789e8b5bd1ed4903deb1189290a5fead7295089d3

                                          SHA512

                                          a8c51ca2c611113b29ba537d01af1f119d160d95436ac45ec166e8f9b064ca23c2ee2905a599d05db8defabbbed49288182bf212aea0fdde91957c5971b9a197

                                        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\HORRORTALE.exe

                                          Filesize

                                          3.1MB

                                          MD5

                                          05d2a8c952cdb5e2348c47ece9535aeb

                                          SHA1

                                          23bbc40ac938b6363f7112b9d3ceee443ce947a2

                                          SHA256

                                          8bda815774afb3e310b9809789e8b5bd1ed4903deb1189290a5fead7295089d3

                                          SHA512

                                          a8c51ca2c611113b29ba537d01af1f119d160d95436ac45ec166e8f9b064ca23c2ee2905a599d05db8defabbbed49288182bf212aea0fdde91957c5971b9a197

                                        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\HORRORTALE.exe

                                          Filesize

                                          3.1MB

                                          MD5

                                          05d2a8c952cdb5e2348c47ece9535aeb

                                          SHA1

                                          23bbc40ac938b6363f7112b9d3ceee443ce947a2

                                          SHA256

                                          8bda815774afb3e310b9809789e8b5bd1ed4903deb1189290a5fead7295089d3

                                          SHA512

                                          a8c51ca2c611113b29ba537d01af1f119d160d95436ac45ec166e8f9b064ca23c2ee2905a599d05db8defabbbed49288182bf212aea0fdde91957c5971b9a197

                                        • memory/1356-59-0x00000000765B1000-0x00000000765B3000-memory.dmp

                                          Filesize

                                          8KB