Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2023 02:31
Static task
static1
Behavioral task
behavioral1
Sample
Papers.Please.v1.2.76/setup_papers_please_1.2.76_(54232).exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Papers.Please.v1.2.76/setup_papers_please_1.2.76_(54232).exe
Resource
win10v2004-20230220-en
General
-
Target
Papers.Please.v1.2.76/setup_papers_please_1.2.76_(54232).exe
-
Size
40.8MB
-
MD5
354d10586bd68448685e925e48810bed
-
SHA1
ddfbe39b92b2277f989e7597af91379d7ec2ef7e
-
SHA256
412de5f617c9115d8199d78ef93e34a9b46e021b81902feb9eef14a4b2c035f0
-
SHA512
6f4f17b5dc51b8448184ba21af9b7dda7f7c91f5c4eef609ae6699b8bead4019fdb6280bf83853cd1db98b1a621c8dfaad4bf2fb13305ba726b66aa046bdb469
-
SSDEEP
786432:pBaa+1a5dqYwSYjm9x+hvRprsSLQWvVyPf/Wj8LT3y53RZYvv/w/go1PIGvUaQvL:ma+1QqYHYSerDHuf/c8LTuT+iNu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
setup_papers_please_1.2.76_(54232).tmppid process 2284 setup_papers_please_1.2.76_(54232).tmp -
Loads dropped DLL 6 IoCs
Processes:
setup_papers_please_1.2.76_(54232).tmppid process 2284 setup_papers_please_1.2.76_(54232).tmp 2284 setup_papers_please_1.2.76_(54232).tmp 2284 setup_papers_please_1.2.76_(54232).tmp 2284 setup_papers_please_1.2.76_(54232).tmp 2284 setup_papers_please_1.2.76_(54232).tmp 2284 setup_papers_please_1.2.76_(54232).tmp -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
setup_papers_please_1.2.76_(54232).exedescription pid process target process PID 1664 wrote to memory of 2284 1664 setup_papers_please_1.2.76_(54232).exe setup_papers_please_1.2.76_(54232).tmp PID 1664 wrote to memory of 2284 1664 setup_papers_please_1.2.76_(54232).exe setup_papers_please_1.2.76_(54232).tmp PID 1664 wrote to memory of 2284 1664 setup_papers_please_1.2.76_(54232).exe setup_papers_please_1.2.76_(54232).tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\Papers.Please.v1.2.76\setup_papers_please_1.2.76_(54232).exe"C:\Users\Admin\AppData\Local\Temp\Papers.Please.v1.2.76\setup_papers_please_1.2.76_(54232).exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-896IN.tmp\setup_papers_please_1.2.76_(54232).tmp"C:\Users\Admin\AppData\Local\Temp\is-896IN.tmp\setup_papers_please_1.2.76_(54232).tmp" /SL5="$70066,42151039,192512,C:\Users\Admin\AppData\Local\Temp\Papers.Please.v1.2.76\setup_papers_please_1.2.76_(54232).exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-896IN.tmp\setup_papers_please_1.2.76_(54232).tmpFilesize
1.3MB
MD5584b93c043e09f22f0f94d90220b90d2
SHA10cc5a8f9c7f6924dc1198001db3218953ac0ad99
SHA256ca4b29bc6469a8a733431e071a360dcca48cf5d4886f455514161c9c62c44256
SHA5122039520e5b8d71984e3203d63472d2ee3d1be2d9294f3add58804f0f55fe361c7de2a82855f3a3f18c9920198eb31a9471a2987c69961c0caef74b7671114736
-
C:\Users\Admin\AppData\Local\Temp\is-TQOIT.tmp\1134577161_english.jpgFilesize
192KB
MD5339f7594a4b849625de4e6f1ed00a0a5
SHA157627516ac4931938e1680a6ac8b5bce7ac5feeb
SHA256d85be7db9614ff25af54ef04b92703aea750e2092e2d648b7d14af8bff80cb2f
SHA512514c83d7222770cc7d6c0cf8cdc70e3f75ac8f8839efa2ff11c6ef7c5f3831479365a02b74c773c7ef1d8ea0dc70dfcfcd4ffb0e813668fee52988e1c850aaac
-
C:\Users\Admin\AppData\Local\Temp\is-TQOIT.tmp\1449651388_english.jpgFilesize
175KB
MD5ae8c0b7dd3bf13bc6409ae912036ce7b
SHA186242f1b6bd60f90c6aaeede756ff07dc3c02492
SHA256fb01ffdf0743e3ae4d3e1a4c80d6f4c487330926deff4f4c78aadf0636f331d7
SHA5127085eaba6d999ee3850303e5b5b410030106e504a7decc05ca7352a7082c9c391a0dd6c609fe6552985870edaa2772cf12ff203b7e32a9702bfc4f845774c0c3
-
C:\Users\Admin\AppData\Local\Temp\is-TQOIT.tmp\BigOK.pngFilesize
3KB
MD55b43a5d975a53f4fc1da67ce9f7784c1
SHA18543fa1e471030049942252b23cb22e0880c3af5
SHA25659d8bb3e87a89ef523c0495addce38d69560af42aaa82f56dd41b12e6612c13a
SHA5125dd5c4e9859a555a4a32da76f5231b44f7556274c6501da530b2cdd570bcb4675f710bee708322a40ed3ef9280c0d652b4e7ef0e9eaf128c08534f59291917f5
-
C:\Users\Admin\AppData\Local\Temp\is-TQOIT.tmp\EULAAccepted.pngFilesize
2KB
MD5461dfeb75927bdb39f9db5348612a611
SHA1b7893b1fff6801e37ee7337d876962a09184941e
SHA2560de278f5ca6d8570d9bda592268a14a28b87d3631fea2d25721947397aaab79c
SHA51268528cf45c81c2c024a672f42c2cd6d4f72c015b443f103ca21deb8ee2bec4f4027490e7f33b5338a87537b5bf7f255f2828aed149f622155ec89cc81687651b
-
C:\Users\Admin\AppData\Local\Temp\is-TQOIT.tmp\EULAShow.pngFilesize
1KB
MD5c596bc9111edc702bbbb29b70984254f
SHA1d4712c7b91ff4f8994e7907d31357c42eb47c738
SHA2566112851daea2aaa7174e8cfac4a0f61c968bc090342503804c476eff47cc2462
SHA512db50d0a39ec644873a03d64552fff1776cc94f016e8dfc8918e65aee94f7529a6de4637567b5e65c4ea988f3775785c4b52c2d96fe8dbc52b1e21ff59c737c2a
-
C:\Users\Admin\AppData\Local\Temp\is-TQOIT.tmp\background.jpgFilesize
416KB
MD5500498a437a2fc611721405ba1f67746
SHA1a13af882cf40884f62d8ef2fa97c5c321db7e3fd
SHA256c25063204ea2bf9311c6e77720d4a69bf11999fb719e78012c1ffa5a4cd3ca22
SHA5124e495d484dfbd18489b0cd7f55320ae34b41eb5441a6f8149adea17d167c88b2429237b1a0f59fd883b659c7b3e8d2dbf706077c70a741aa4669351c7938e6b0
-
C:\Users\Admin\AppData\Local\Temp\is-TQOIT.tmp\botva2.dllFilesize
35KB
MD50177746573eed407f8dca8a9e441aa49
SHA16b462adf78059d26cbc56b3311e3b97fcb8d05f7
SHA256a4b61626a1626fdabec794e4f323484aa0644baa1c905a5dcf785dc34564f008
SHA512d4ac96da2d72e121d1d63d64e78bcea155d62af828324b81889a3cd3928ceeb12f7a22e87e264e34498d100b57cdd3735d2ab2316e1a3bf7fa099ddb75c5071a
-
C:\Users\Admin\AppData\Local\Temp\is-TQOIT.tmp\botva2.dllFilesize
35KB
MD50177746573eed407f8dca8a9e441aa49
SHA16b462adf78059d26cbc56b3311e3b97fcb8d05f7
SHA256a4b61626a1626fdabec794e4f323484aa0644baa1c905a5dcf785dc34564f008
SHA512d4ac96da2d72e121d1d63d64e78bcea155d62af828324b81889a3cd3928ceeb12f7a22e87e264e34498d100b57cdd3735d2ab2316e1a3bf7fa099ddb75c5071a
-
C:\Users\Admin\AppData\Local\Temp\is-TQOIT.tmp\btn_md5.pngFilesize
8KB
MD53befe9739354ee24a0b1ea8df05ce274
SHA1ab0bda986a8c46aa19f57b75a2b7b22445a3c625
SHA256b0193ab375f604fa4a25cabdea8f713babde1c07ab562ffc5679352c8e01db47
SHA512ac016a59e0bfc9b22c376ae5d498c5660893a983d932b2bd502dabe032883c69e79ea8d93c2db49f95415c3cdb068e9f7d1d85527a4f9e68e065a989852d09dd
-
C:\Users\Admin\AppData\Local\Temp\is-TQOIT.tmp\crcdll.dllFilesize
69KB
MD51d51fac9e2384eeb674199cfd5281d7d
SHA1861dfdc121357d605d0cc3793266713788109eb2
SHA25623e90ce5a1f2d634a7bf5d5d0522fafeea6df9e536e16f5ce91035d5197128ec
SHA512921b00adfe43b883200960e8d0958d4e6b97f6d5cfc096ee277766a3e44cc7805a20877a4edf8bd4d9102bb71a20ac218a9a512f4f76bd751d3ef14f4e0a6eda
-
C:\Users\Admin\AppData\Local\Temp\is-TQOIT.tmp\error.pngFilesize
726B
MD5df10adc25b673e74e19971c17bee5a98
SHA1ee16fb1cf9491f5e611282f0574b27d76fede412
SHA256142b16dc6239421691fa6e619d1a61e61176d89fa018a88b46893c29a57aad8b
SHA512dc3de10e0321966cbbfb2e57b3b41da6f26dff0c7233a47469da58775b5c471e6b5181e4d4ffc81ef8b83dbcad74ccc1aad7678518f99c9185a441d2a23e010f
-
C:\Users\Admin\AppData\Local\Temp\is-TQOIT.tmp\innocallback.dllFilesize
63KB
MD51c55ae5ef9980e3b1028447da6105c75
SHA1f85218e10e6aa23b2f5a3ed512895b437e41b45c
SHA2566afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f
SHA5121ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b
-
C:\Users\Admin\AppData\Local\Temp\is-TQOIT.tmp\ok.pngFilesize
1KB
MD5103c1368e60806b1b7995a0894eacf87
SHA1971392527f6e4b655044773132505c901a6b5469
SHA2560d37d4421a39ca8852eb6760b8e914302bdc6cfcc7b170dc1b6c9bb9be148b7e
SHA512652177e94438aff102f2ed873b26f0985ebed134763852b49b1ca2698463c1dbeb85152f19c8e18d397229ec5cb2cd1d17c61d454ab7c425a2cab540adc8228a
-
C:\Users\Admin\AppData\Local\Temp\is-TQOIT.tmp\slideshow.iniFilesize
279B
MD5ad0ed70c79608288af8c69914e68c90d
SHA187334e310ba0bc5d05b7dffdf6ed258a8b56a4d8
SHA25667cb7a731cb50a9e45cd684cdae147aee6a34842aea936cca1f9fcde266dc5a7
SHA512c5606f19e3eabc128e8991821e9cc925d3e0f09dbda16ec9653349ed7d412d1b895634ba0d16396f57c28c478457d8c9aa62704da24f96c7434254da39ba8dda
-
C:\Users\Admin\AppData\Local\Temp\is-TQOIT.tmp\uninstall.dllFilesize
691KB
MD57db706c324cc9b6fda497d081eed6e26
SHA1ca97392e573af0cf61bfa3301801a85f2beea44c
SHA256cc685dbcf798549ad1a51c1dde45462e2a451ec59f48ee91219182a3871cd5b0
SHA5128edf1494d57d5e708faaff4170f21f435658be897a6fe0acf243ced0701a7fd574b3c973c5bc5e8d92815e966c98977e69ac1e3083ab00c11b072115527ffa19
-
C:\Users\Admin\AppData\Local\Temp\is-TQOIT.tmp\uninstall.dllFilesize
691KB
MD57db706c324cc9b6fda497d081eed6e26
SHA1ca97392e573af0cf61bfa3301801a85f2beea44c
SHA256cc685dbcf798549ad1a51c1dde45462e2a451ec59f48ee91219182a3871cd5b0
SHA5128edf1494d57d5e708faaff4170f21f435658be897a6fe0acf243ced0701a7fd574b3c973c5bc5e8d92815e966c98977e69ac1e3083ab00c11b072115527ffa19
-
memory/1664-269-0x0000000000060000-0x0000000000099000-memory.dmpFilesize
228KB
-
memory/1664-133-0x0000000000060000-0x0000000000099000-memory.dmpFilesize
228KB
-
memory/2284-147-0x0000000003690000-0x0000000003747000-memory.dmpFilesize
732KB
-
memory/2284-138-0x0000000002E00000-0x0000000002E01000-memory.dmpFilesize
4KB
-
memory/2284-268-0x0000000003750000-0x0000000003751000-memory.dmpFilesize
4KB
-
memory/2284-192-0x00000000056E0000-0x00000000056EE000-memory.dmpFilesize
56KB
-
memory/2284-270-0x0000000000B00000-0x0000000000C52000-memory.dmpFilesize
1.3MB
-
memory/2284-271-0x0000000000400000-0x0000000000415000-memory.dmpFilesize
84KB
-
memory/2284-273-0x00000000056E0000-0x00000000056EE000-memory.dmpFilesize
56KB
-
memory/2284-272-0x0000000003690000-0x0000000003747000-memory.dmpFilesize
732KB
-
memory/2284-274-0x0000000002E00000-0x0000000002E01000-memory.dmpFilesize
4KB
-
memory/2284-282-0x0000000000400000-0x0000000000415000-memory.dmpFilesize
84KB
-
memory/2284-284-0x00000000056E0000-0x00000000056EE000-memory.dmpFilesize
56KB