Analysis
-
max time kernel
128s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
18/03/2023, 22:10
Static task
static1
Behavioral task
behavioral1
Sample
MegaHack v5.4 SETUP.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
MegaHack v5.4 SETUP.exe
Resource
win10v2004-20230220-en
General
-
Target
MegaHack v5.4 SETUP.exe
-
Size
14.6MB
-
MD5
21f8588ba383393390d76ca642d73183
-
SHA1
292d500d0ab46c701b33a93284e99a5144078be6
-
SHA256
85f9e216a24dd777f8e4b7db008128d402355eb93a316fa6ba6c6d8392720a19
-
SHA512
6426425fcf4ca0ae1ebfbc5b1b91f86a4b9a1bb7a9dc1f648879d3f810c1e5a36d0f3b56effe1f204d0e1847eb93b0ca00fd7c5c2899a8097268f9eddfcbcbd0
-
SSDEEP
393216:mEGDkj4i79yFTB3HWNmHrjAbh6pBKzd25iFsmF5cISZH:mnA/EFTB3RHyzQxmF5C
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1196 MegaHack v5.4 SETUP.tmp -
Loads dropped DLL 1 IoCs
pid Process 2024 MegaHack v5.4 SETUP.exe -
Drops file in Program Files directory 47 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Mega Hack\libEGL.dll MegaHack v5.4 SETUP.tmp File opened for modification C:\Program Files (x86)\Mega Hack\dlls\cosmiclove.dll MegaHack v5.4 SETUP.tmp File opened for modification C:\Program Files (x86)\Mega Hack\styles\qwindowsvistastyle.dll MegaHack v5.4 SETUP.tmp File opened for modification C:\Program Files (x86)\Mega Hack\dlls\whitemagic.dll MegaHack v5.4 SETUP.tmp File opened for modification C:\Program Files (x86)\Mega Hack\Qt5Gui.dll MegaHack v5.4 SETUP.tmp File opened for modification C:\Program Files (x86)\Mega Hack\imageformats\qwebp.dll MegaHack v5.4 SETUP.tmp File opened for modification C:\Program Files (x86)\Mega Hack\libgcc_s_dw2-1.dll MegaHack v5.4 SETUP.tmp File opened for modification C:\Program Files (x86)\Mega Hack\libGLESV2.dll MegaHack v5.4 SETUP.tmp File created C:\Program Files (x86)\Mega Hack\is-3IAD9.tmp MegaHack v5.4 SETUP.tmp File created C:\Program Files (x86)\Mega Hack\is-8L1U5.tmp MegaHack v5.4 SETUP.tmp File created C:\Program Files (x86)\Mega Hack\is-IC8MG.tmp MegaHack v5.4 SETUP.tmp File opened for modification C:\Program Files (x86)\Mega Hack\imageformats\qicns.dll MegaHack v5.4 SETUP.tmp File opened for modification C:\Program Files (x86)\Mega Hack\imageformats\qtga.dll MegaHack v5.4 SETUP.tmp File created C:\Program Files (x86)\Mega Hack\unins000.dat MegaHack v5.4 SETUP.tmp File opened for modification C:\Program Files (x86)\Mega Hack\imageformats\qtiff.dll MegaHack v5.4 SETUP.tmp File opened for modification C:\Program Files (x86)\Mega Hack\MegaHack.exe MegaHack v5.4 SETUP.tmp File created C:\Program Files (x86)\Mega Hack\is-LPCRI.tmp MegaHack v5.4 SETUP.tmp File created C:\Program Files (x86)\Mega Hack\is-NVR9C.tmp MegaHack v5.4 SETUP.tmp File created C:\Program Files (x86)\Mega Hack\is-GOUBT.tmp MegaHack v5.4 SETUP.tmp File created C:\Program Files (x86)\Mega Hack\is-152TH.tmp MegaHack v5.4 SETUP.tmp File opened for modification C:\Program Files (x86)\Mega Hack\dlls\hotmilk.dll MegaHack v5.4 SETUP.tmp File opened for modification C:\Program Files (x86)\Mega Hack\D3Dcompiler_47.dll MegaHack v5.4 SETUP.tmp File opened for modification C:\Program Files (x86)\Mega Hack\imageformats\qgif.dll MegaHack v5.4 SETUP.tmp File opened for modification C:\Program Files (x86)\Mega Hack\libstdc++-6.dll MegaHack v5.4 SETUP.tmp File opened for modification C:\Program Files (x86)\Mega Hack\dlls\sorryforlovingyou.dll MegaHack v5.4 SETUP.tmp File opened for modification C:\Program Files (x86)\Mega Hack\ssleay32.dll MegaHack v5.4 SETUP.tmp File opened for modification C:\Program Files (x86)\Mega Hack\Qt5Core.dll MegaHack v5.4 SETUP.tmp File created C:\Program Files (x86)\Mega Hack\is-0DUJD.tmp MegaHack v5.4 SETUP.tmp File opened for modification C:\Program Files (x86)\Mega Hack\imageformats\qwbmp.dll MegaHack v5.4 SETUP.tmp File opened for modification C:\Program Files (x86)\Mega Hack\imageformats\qjpeg.dll MegaHack v5.4 SETUP.tmp File opened for modification C:\Program Files (x86)\Mega Hack\imageformats\qsvg.dll MegaHack v5.4 SETUP.tmp File created C:\Program Files (x86)\Mega Hack\is-AHTP0.tmp MegaHack v5.4 SETUP.tmp File created C:\Program Files (x86)\Mega Hack\is-SEGT7.tmp MegaHack v5.4 SETUP.tmp File opened for modification C:\Program Files (x86)\Mega Hack\Qt5Widgets.dll MegaHack v5.4 SETUP.tmp File opened for modification C:\Program Files (x86)\Mega Hack\platforms\qwindows.dll MegaHack v5.4 SETUP.tmp File opened for modification C:\Program Files (x86)\Mega Hack\imageformats\qico.dll MegaHack v5.4 SETUP.tmp File opened for modification C:\Program Files (x86)\Mega Hack\bearer\qgenericbearer.dll MegaHack v5.4 SETUP.tmp File opened for modification C:\Program Files (x86)\Mega Hack\Qt5Svg.dll MegaHack v5.4 SETUP.tmp File opened for modification C:\Program Files (x86)\Mega Hack\Qt5Network.dll MegaHack v5.4 SETUP.tmp File opened for modification C:\Program Files (x86)\Mega Hack\opengl32sw.dll MegaHack v5.4 SETUP.tmp File opened for modification C:\Program Files (x86)\Mega Hack\libeay32.dll MegaHack v5.4 SETUP.tmp File created C:\Program Files (x86)\Mega Hack\is-QHE8S.tmp MegaHack v5.4 SETUP.tmp File created C:\Program Files (x86)\Mega Hack\is-DCE1I.tmp MegaHack v5.4 SETUP.tmp File created C:\Program Files (x86)\Mega Hack\is-7H76Q.tmp MegaHack v5.4 SETUP.tmp File opened for modification C:\Program Files (x86)\Mega Hack\libwinpthread-1.dll MegaHack v5.4 SETUP.tmp File opened for modification C:\Program Files (x86)\Mega Hack\iconengines\qsvgicon.dll MegaHack v5.4 SETUP.tmp File created C:\Program Files (x86)\Mega Hack\is-1HD39.tmp MegaHack v5.4 SETUP.tmp -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1196 MegaHack v5.4 SETUP.tmp 1196 MegaHack v5.4 SETUP.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1196 MegaHack v5.4 SETUP.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1196 MegaHack v5.4 SETUP.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2024 wrote to memory of 1196 2024 MegaHack v5.4 SETUP.exe 28 PID 2024 wrote to memory of 1196 2024 MegaHack v5.4 SETUP.exe 28 PID 2024 wrote to memory of 1196 2024 MegaHack v5.4 SETUP.exe 28 PID 2024 wrote to memory of 1196 2024 MegaHack v5.4 SETUP.exe 28 PID 2024 wrote to memory of 1196 2024 MegaHack v5.4 SETUP.exe 28 PID 2024 wrote to memory of 1196 2024 MegaHack v5.4 SETUP.exe 28 PID 2024 wrote to memory of 1196 2024 MegaHack v5.4 SETUP.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\MegaHack v5.4 SETUP.exe"C:\Users\Admin\AppData\Local\Temp\MegaHack v5.4 SETUP.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\is-UBO4Q.tmp\MegaHack v5.4 SETUP.tmp"C:\Users\Admin\AppData\Local\Temp\is-UBO4Q.tmp\MegaHack v5.4 SETUP.tmp" /SL5="$70126,15016215,57856,C:\Users\Admin\AppData\Local\Temp\MegaHack v5.4 SETUP.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1196
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD5ca8b5dba03f3a1ecc3901d156251f590
SHA1dda8a51fe14e793cd1498bff2b0f07f029f6b7c4
SHA256d63e28c5ddd74b71f7b2c897f7d373779ac5d2ecb7476b373ddec179ba42cc05
SHA512bd17cb2c0ceac093fa54a7e15d17e87d440550540a9dd3915498f0dfac82474e59247ea5a2d9b4a4d2020f83455a0cd24149694b979699a22f0d106c65ef260f
-
Filesize
697KB
MD5832dab307e54aa08f4b6cdd9b9720361
SHA1ebd007fb7482040ecf34339e4bf917209c1018df
SHA256cc783a04ccbca4edd06564f8ec88fe5a15f1e3bb26cec7de5e090313520d98f3
SHA512358d43522fd460eb1511708e4df22ea454a95e5bc3c4841931027b5fa3fb1dda05d496d8ad0a8b9279b99e6be74220fe243db8f08ef49845e9fb35c350ef4b49
-
Filesize
697KB
MD5832dab307e54aa08f4b6cdd9b9720361
SHA1ebd007fb7482040ecf34339e4bf917209c1018df
SHA256cc783a04ccbca4edd06564f8ec88fe5a15f1e3bb26cec7de5e090313520d98f3
SHA512358d43522fd460eb1511708e4df22ea454a95e5bc3c4841931027b5fa3fb1dda05d496d8ad0a8b9279b99e6be74220fe243db8f08ef49845e9fb35c350ef4b49
-
Filesize
697KB
MD5832dab307e54aa08f4b6cdd9b9720361
SHA1ebd007fb7482040ecf34339e4bf917209c1018df
SHA256cc783a04ccbca4edd06564f8ec88fe5a15f1e3bb26cec7de5e090313520d98f3
SHA512358d43522fd460eb1511708e4df22ea454a95e5bc3c4841931027b5fa3fb1dda05d496d8ad0a8b9279b99e6be74220fe243db8f08ef49845e9fb35c350ef4b49