Resubmissions

10-02-2023 16:09

230210-tl8rrshf92 10

10-02-2023 16:01

230210-tgqqdshd57 10

Analysis

  • max time kernel
    149s
  • max time network
    200s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    10-02-2023 16:09

General

  • Target

    Dragon Ball Z Kakarot v1.03-v1.60 Plus 32 Trainer.exe

  • Size

    1.3MB

  • MD5

    5976447d2d9d6aca7e3df4bc0d27bfe7

  • SHA1

    0a137d372e3123713f7c690fa2831de162ae69c8

  • SHA256

    a9ac519ca396e0878eb15b11d7c697bc175f380b00162f4cb351239353747d3a

  • SHA512

    6eca409e1053b23f3affc9d2d7f562ddae0c60de55183ae82b1098c896f7d1b48fa12ed39c96b0f4ca8a06ddd7aae22dbd2003b2389793a702d32528afeefa87

  • SSDEEP

    24576:NkwWyiqAVWAvGNYn3rJ4FJXFtspAyji8GbJ7NDSIWC1:LuVuOnN4oALFV7bWC1

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 54 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Dragon Ball Z Kakarot v1.03-v1.60 Plus 32 Trainer.exe
    "C:\Users\Admin\AppData\Local\Temp\Dragon Ball Z Kakarot v1.03-v1.60 Plus 32 Trainer.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://flingtrainer.com/tag/dragon-ball-z-kakarot
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:972
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:972 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1972

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27

    Filesize

    1KB

    MD5

    f52c62cd342ecab74df733e90777db4c

    SHA1

    b0b8c50a110f9f278f51768663dddfe375546517

    SHA256

    a721740583dbc33f321d2d3ba435de82fe1d325b69fdd824cc348e7b1ff64f89

    SHA512

    b722e16f5404e9c3b5988e4e8f33dfcf3a989e12c9f5e5e4600544b04e8df61a3dffcc6f261ec980f8e786c8714e5487cd9887fb666b6a7dfd29e9be184d9b6a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9FF67FB3141440EED32363089565AE60_05ED48EBCAD3CF1C57469DA2AC7B214B

    Filesize

    278B

    MD5

    e6bfb75272dcd99e4c743ffc1b332c9b

    SHA1

    fc273e463f921daf51ad55fa8e5fad5f7e798641

    SHA256

    d66ea8fc2ebd44ee2ba9f20f7ee7a3da98aebed52ed1d644ecad40c8927027c7

    SHA512

    e71f6203f83b839dc48c6325823d8922620bc11f84179e7509acbcaea2e84af36334190a1d3de0ae16101ad3784d9d8b40f74225187969e7984859db6ae1a367

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27

    Filesize

    438B

    MD5

    ce6e444ed50fdde4225048e6a38735dd

    SHA1

    bd11837a2d0479bb4ff67e620b535fe5c837aa78

    SHA256

    f041e8d3c5f1951d19c6a03171c00b8e8af946162fb380111dd26052b2118be4

    SHA512

    f1c9ece690b43870128424357934c1665a22353dd04257cdccf93ed34c87b341c880efac388a725fbbd9ed6c4839fb6cc4652be2aa5bd4ae77b8bdcdde951cb7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    032cd9aa51a615f48092b5b87de46a7e

    SHA1

    f8ce5560d14491fcb768817c581eb9d3d9a7470f

    SHA256

    737767a676313e2f70ed1e42bc875b18ff351d2c79504d73266648d1bd1895cf

    SHA512

    da013f0f3733d7c761d4b45112c4d3f50c64ce9075ed3cdd0c71ea071c1d6735bd05e415b71efdd6eb3789c2722d53fa6f80527413c738cbc4459fade5a86435

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9FF67FB3141440EED32363089565AE60_05ED48EBCAD3CF1C57469DA2AC7B214B

    Filesize

    426B

    MD5

    53abdc45c1a134121aaebb3612781d73

    SHA1

    68cb11aa3bcb7568f49402074412ced31a1ebc7a

    SHA256

    f8b5e93e3a26d2f41edc42ea9d3262726bcb876bd938ad2236a9aab16278ba73

    SHA512

    d1af482854aacfe3da513d55521ae25e92516f552fbad9a1aaecff271045958d0b35d268d57209b029a62936ee52f3755c90b804211f7a153fb0e5e39e2aee97

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\try74lz\imagestore.dat

    Filesize

    3KB

    MD5

    3620383de14da28e3152e4be049125c6

    SHA1

    f24e7356208199de846b825c6e7e5000ba71b271

    SHA256

    2c2fe9e757691cd2c05c3ef470e2e7c2a22c8b07a8e27ae8b9779f6d73339a31

    SHA512

    51cb018a9aeb11bbc71cba82019d91976c6632cd592b6916d5060119b7873d4802e9ab6422a00ee1dc25a66f2bf18c0c4f85e170fb3a975a770c789c1c3a0c6e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\KI43NRHK.txt

    Filesize

    605B

    MD5

    5751b4421a00f47ad8cd5d043a6c90f8

    SHA1

    b11389b16afd301f8641df897f822223c40702d0

    SHA256

    d797029054aba69c51156d2c44d40a1b420cb3b0cd2b3290dbc7bdaeca7b129f

    SHA512

    603a000ded9056266e54e8d6b485e8eb8174c8abd01232eaf62cb1d3e58daa2f1da118db5611c18ad60a1187f1e6d197586e643db46c52037e9f45599aafb948

  • memory/2012-54-0x0000000001C70000-0x0000000001CA2000-memory.dmp

    Filesize

    200KB

  • memory/2012-55-0x00000000024EC000-0x000000000250B000-memory.dmp

    Filesize

    124KB

  • memory/2012-56-0x00000000024EC000-0x000000000250B000-memory.dmp

    Filesize

    124KB