Overview
overview
7Static
static
1gd.rar
windows10-1703-x64
3gd/Resourc...hd.xml
windows10-1703-x64
1gd/Resourc...hd.xml
windows10-1703-x64
1gd/Resourc...et.xml
windows10-1703-x64
1gd/Resourc...hd.xml
windows10-1703-x64
1gd/Resourc...hd.xml
windows10-1703-x64
1gd/Resourc...et.xml
windows10-1703-x64
1gd/Resourc...hd.xml
windows10-1703-x64
1gd/Resourc...hd.xml
windows10-1703-x64
1gd/Resourc...et.xml
windows10-1703-x64
1gd/Resourc...01.xml
windows10-1703-x64
1gd/Resourc...02.xml
windows10-1703-x64
1gd/Resourc...03.xml
windows10-1703-x64
1gd/Resourc...hd.xml
windows10-1703-x64
1gd/Resourc...hd.xml
windows10-1703-x64
1gd/Resourc...et.xml
windows10-1703-x64
1gd/Resourc...64.exe
windows10-1703-x64
7gd/Resourc...86.exe
windows10-1703-x64
7gd/Resourc...64.exe
windows10-1703-x64
7gd/Resourc...86.exe
windows10-1703-x64
7gd/Resourc...ct.xml
windows10-1703-x64
1gd/Resourc...ct.xml
windows10-1703-x64
1gd/Resourc...ct.xml
windows10-1703-x64
1gd/Resourc...ct.xml
windows10-1703-x64
1gd/Resourc...ct.xml
windows10-1703-x64
1gd/Resourc...ct.xml
windows10-1703-x64
1gd/Resourc...en.xml
windows10-1703-x64
1gd/Resourc...ed.xml
windows10-1703-x64
1gd/Resourc...ct.xml
windows10-1703-x64
1gd/Resourc...ct.xml
windows10-1703-x64
1gd/Resourc...ct.xml
windows10-1703-x64
1gd/Resourc...ct.xml
windows10-1703-x64
1Analysis
-
max time kernel
170s -
max time network
232s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
11-02-2023 18:56
Static task
static1
Behavioral task
behavioral1
Sample
gd.rar
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
gd/Resources/CCControlColourPickerSpriteSheet-hd.xml
Resource
win10-20220901-en
Behavioral task
behavioral3
Sample
gd/Resources/CCControlColourPickerSpriteSheet-uhd.xml
Resource
win10-20220812-en
Behavioral task
behavioral4
Sample
gd/Resources/CCControlColourPickerSpriteSheet.xml
Resource
win10-20220901-en
Behavioral task
behavioral5
Sample
gd/Resources/DungeonSheet-hd.xml
Resource
win10-20220812-en
Behavioral task
behavioral6
Sample
gd/Resources/DungeonSheet-uhd.xml
Resource
win10-20220812-en
Behavioral task
behavioral7
Sample
gd/Resources/DungeonSheet.xml
Resource
win10-20220812-en
Behavioral task
behavioral8
Sample
gd/Resources/FireSheet_01-hd.xml
Resource
win10-20220812-en
Behavioral task
behavioral9
Sample
gd/Resources/SecretSheet-uhd.xml
Resource
win10-20220901-en
Behavioral task
behavioral10
Sample
gd/Resources/SecretSheet.xml
Resource
win10-20220901-en
Behavioral task
behavioral11
Sample
gd/Resources/Skull_w_01.xml
Resource
win10-20220812-en
Behavioral task
behavioral12
Sample
gd/Resources/Skull_w_02.xml
Resource
win10-20220812-en
Behavioral task
behavioral13
Sample
gd/Resources/Skull_w_03.xml
Resource
win10-20220812-en
Behavioral task
behavioral14
Sample
gd/Resources/WorldSheet-hd.xml
Resource
win10-20220812-en
Behavioral task
behavioral15
Sample
gd/Resources/WorldSheet-uhd.xml
Resource
win10-20220812-en
Behavioral task
behavioral16
Sample
gd/Resources/WorldSheet.xml
Resource
win10-20220812-en
Behavioral task
behavioral17
Sample
gd/Resources/_CommonRedist/vcredist/2010/vcredist_x64.exe
Resource
win10-20220812-en
Behavioral task
behavioral18
Sample
gd/Resources/_CommonRedist/vcredist/2010/vcredist_x86.exe
Resource
win10-20220812-en
Behavioral task
behavioral19
Sample
gd/Resources/_CommonRedist/vcredist/2013/vcredist_x64.exe
Resource
win10-20220812-en
Behavioral task
behavioral20
Sample
gd/Resources/_CommonRedist/vcredist/2013/vcredist_x86.exe
Resource
win10-20220812-en
Behavioral task
behavioral21
Sample
gd/Resources/boost_01_effect.xml
Resource
win10-20220901-en
Behavioral task
behavioral22
Sample
gd/Resources/boost_02_effect.xml
Resource
win10-20220812-en
Behavioral task
behavioral23
Sample
gd/Resources/boost_03_effect.xml
Resource
win10-20220812-en
Behavioral task
behavioral24
Sample
gd/Resources/boost_04_effect.xml
Resource
win10-20220812-en
Behavioral task
behavioral25
Sample
gd/Resources/bubbleEffect.xml
Resource
win10-20220812-en
Behavioral task
behavioral26
Sample
gd/Resources/bumpEffect.xml
Resource
win10-20220812-en
Behavioral task
behavioral27
Sample
gd/Resources/chestOpen.xml
Resource
win10-20220901-en
Behavioral task
behavioral28
Sample
gd/Resources/chestOpened.xml
Resource
win10-20220812-en
Behavioral task
behavioral29
Sample
gd/Resources/coinEffect.xml
Resource
win10-20220812-en
Behavioral task
behavioral30
Sample
gd/Resources/coinPickupEffect.xml
Resource
win10-20220812-en
Behavioral task
behavioral31
Sample
gd/Resources/dashEffect.xml
Resource
win10-20220812-en
Behavioral task
behavioral32
Sample
gd/Resources/dragEffect.xml
Resource
win10-20220901-en
General
-
Target
gd/Resources/DungeonSheet-uhd.xml
-
Size
2KB
-
MD5
27ba105952636545dddebc4e8337c7e3
-
SHA1
ef45e7d19370d3c4a65bca01b60d94339ea009c0
-
SHA256
4f93ece615eb1f276d22cdd72d873be10a2d4bf90266743e80a1cf5d0dd67291
-
SHA512
e4dfd2b6ccf4fe0760027e922450d6dea7b820d457acf3bf0b04ee861a40f1169bdeb1b101e007b501ed135c8bf8179e0586e8a011ec33f0f0a37883a29c97c6
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60ee90bd533ed901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31014483" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3293678703" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31014483" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000024a4550b7903346ad183f6abc74a2b700000000020000000000106600000001000020000000fd16f7fef8309bf1eb5a42578ddaf8ef2678df20e47d088630f30ec01b6a4314000000000e800000000200002000000017f7a8e769457e7004627833bd9388899b85c70c0d4036ef6fbfd3cf87c402992000000096938986b7ece071aaecfcc67d2d3f56fe1183fdc5e0a4be9af2cfd1447774144000000040487564c0fa98af75a1f37b54013cd23a55d6d667a047393640a1a38947d90139239550301509544aa2f74a6e91bc39cdb411da2497dd0d16359543b0ea1af0 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31014483" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E66CFE1A-AA46-11ED-98FA-DA51CA8B26EF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31014483" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3294303789" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000024a4550b7903346ad183f6abc74a2b7000000000200000000001066000000010000200000000adca0586428f85b5b30a42d4ad0afa82481efebb35ebe87b85fd826d6a003d3000000000e80000000020000200000009efd56e80f9b369176fb9a71554b82a8f424dcf9afd41a0d11e925d6ed6be94520000000df6b968b035253ee72e079c470bda1a18b7ecd1a10c3e483a8c9c412b562d1a640000000b1342d757dbe570014deb16cb0207d10a17e5dbb82c6bef02104718ef8eaf1b1ff90172f538deb1ab16d2edf0777ef7d04206836dc70b934104177409a63bf69 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3293678703" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 607251c4533ed901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3294146900" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3864 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3864 iexplore.exe 3864 iexplore.exe 4216 IEXPLORE.EXE 4216 IEXPLORE.EXE 4216 IEXPLORE.EXE 4216 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
MSOXMLED.EXEiexplore.exedescription pid process target process PID 4324 wrote to memory of 3864 4324 MSOXMLED.EXE iexplore.exe PID 4324 wrote to memory of 3864 4324 MSOXMLED.EXE iexplore.exe PID 3864 wrote to memory of 4216 3864 iexplore.exe IEXPLORE.EXE PID 3864 wrote to memory of 4216 3864 iexplore.exe IEXPLORE.EXE PID 3864 wrote to memory of 4216 3864 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE"C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\gd\Resources\DungeonSheet-uhd.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\gd\Resources\DungeonSheet-uhd.xml2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3864 CREDAT:82945 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4216
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
779B
MD552459475bbead1cc9bba0ff24722c884
SHA11e6cddf21f19f4819050782cd075b72fc96abd7e
SHA25623866b98ab3cc0c8db11f876560468be263c7bfd29c2de29cb36e6eb68c5c67b
SHA5129fd1c809e66ae2443bdc9adb6e3bcc7b50a26eb6f518d317bd1b9a152cc9164145637fc393fdd6e4473e84dce947d638127259684a49bdd33dc5458385e6dbb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\69C6F6EC64E114822DF688DC12CDD86C
Filesize246B
MD575635a66ac78fc0b4e13879f34e21566
SHA1326c67d4813a3696721f39c71d1ba1fb660ed4f3
SHA2567100a1e1f01ff6742fcab7799f886b3427e8adef270fe4138efaad032698c186
SHA512ef882d4e9351011ef6310e2296f29fdc2e2c2c2b9af92684cd5006759151d5c03e64f2cca3d245c972b46cef97e0142ad6024b0027a5836b45747b36931202fd