Resubmissions

22/03/2023, 15:40

230322-s364tsbe8w 4

21/03/2023, 20:26

230321-y76lraeh8z 4

21/03/2023, 00:44

230321-a3tvdsga86 8

21/03/2023, 00:41

230321-a11j6aga76 4

21/03/2023, 00:38

230321-ay45kaaa3s 4

Analysis

  • max time kernel
    115s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    21/03/2023, 20:26

General

  • Target

    playit-0.9.3-signed.exe

  • Size

    13.1MB

  • MD5

    da0750733bf36c61222eefaba4805dcb

  • SHA1

    304e90d123300e646b768f1f358e59ba506b7dce

  • SHA256

    c9ff8f05cdde137cb0e1e386184a42d4889988c4cfd235fd3340fe545f5e06ac

  • SHA512

    f9a8e89f294257f785388e237a6da1f363f8d78af7c9b473d67261b99526224eb84598eacbba17f01a9f2eb2f6fea0740f7e37df92891df8fa39a33820287454

  • SSDEEP

    98304:6apOovS/Un0PwGpPRzrkEF1u+aVbrE+ziKZRqAo/pkyJIjKAUroIMlUtbPb9c/z4:zkr7pZk5EgiSs5

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\playit-0.9.3-signed.exe
    "C:\Users\Admin\AppData\Local\Temp\playit-0.9.3-signed.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://playit.gg/claim/98d0387ee5
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1492
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1492 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:596

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    10c94ddf05722aad3d740b8c92c1f9d2

    SHA1

    8a6f47174db21caad1d0ee8436846088194580a8

    SHA256

    8adb50fc59f89af45f68f04838db18030b043b5fb770389f6e5bf64186844b3b

    SHA512

    d0257e68e3ed721725a303b60b8026b9d299bdecb5ad36cc110324c2bb5ddfb02340a7693270eb4aec870410ea469f8bf5bb8eecd0a198312e7ee6166e397a4e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    e71c8443ae0bc2e282c73faead0a6dd3

    SHA1

    0c110c1b01e68edfacaeae64781a37b1995fa94b

    SHA256

    95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

    SHA512

    b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    a29950840a83d6abfdbd473ead1725e9

    SHA1

    fa6dfb063c396b86b6f307fa7040db6d10560628

    SHA256

    8de2ecd8906287be28d871f63b86cdf4333e456b19bd3a9e8d3629311f81dd77

    SHA512

    761adf79aef18bd060fd1df46153d34cfec57f49b8b0e4c67618c33e3c92f2eb1500cba901f41250fc902a88d93101f78010cd35e92cb37bc6cf7f2c0000d92f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e7a13cf698836d45d4879ac09a187480

    SHA1

    32a574c14d459f8567e958f3318bc21324ff8bbf

    SHA256

    875d6079d15af1e53df5f2452caea561307abc509b1d3371b9ee5437cdf2b69a

    SHA512

    618645f1c020d965493780bda2eeac12d04cb4534624a55b67fa7a95e6d0df78e016ca923bb56e8b2aa1ce574343be57780c8e4b11143a539524a9f3d1c6fbf5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e9c7cec16cd1ade46519b12b132ed243

    SHA1

    79a2517bcb8b9334e4157917c069fb651583f2f7

    SHA256

    8b717830c06450b276e6f95856cf6c1ea5651954fe7850c30dfa1c9b78c347f0

    SHA512

    99aca645b9608d743e15c9b9b54118f62ec561b3e88509a9f31a6c86ab282f4a3c56c1930a0c13c3c976b0e21ed13af51eafa61d3b9646b241e7404f952ef4ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    99f93b617bb48fafe3f4fde1c0e02bf9

    SHA1

    66758e4e499175285c07a76cb1cc20136e43657c

    SHA256

    529f42839b2037db92cd6f63b1e71f97299f497296247be686f068d4afc9ec9f

    SHA512

    8c7591df079b848d0ac913e57464e5aee71310d32cff0371c2877bfde2038c1527ee268c4adf817930c533552b94c4e1c046711c6df3c238e8c64068b6abbba9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    de97ebb6e9741651d11f57aa0ee93ab2

    SHA1

    8d0f5b4966a2f65c0358a8720aadfb58eb2571bc

    SHA256

    be8f396c301c9ad01d3c7b88cf98dd7ec338b21c1c246139b71ce3f38249c73e

    SHA512

    7f766a28a9ed74fd97ea77697d71655432b0b3f2b90e909856e791b3a71935f5bd97afe8e615c4a7a1c64a19ee5be391c7823d7dbba1c34dac0e093a5e4dc212

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    93e5c61cbf7385663fbba67b77ad3051

    SHA1

    13f4c4d088bbe881591739ea476d1fa314fd1e27

    SHA256

    0b6bb864353b9d0110ea7dbc53f4a0b09427887ea837fc91425f1acc62875b2c

    SHA512

    e3e0245289d6556951f530510d9d238e69a44e26fde588747b946931b5f58fba454286664ded166863f74c6c2b62c14bdddbe80394f09341f3c2ac7a353e0ff1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    860b0c7fac53a7084c2814b8940d2860

    SHA1

    52b0c6d4c03ba8370b71b518634b523100c96c29

    SHA256

    60ec61e4f86c1168c9774645a496f4be957c18fd69877aacdbade4497f0ab32e

    SHA512

    a9172ae7af3ca1940571d5b897176dc14fae0d965a9d6df2ab76d2dfe6c9fc6d8a16df1bb879b817bc07c7ae2edecdd17a2841f946c42e4d7de30fd006bd895d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a21745e75bce94eb7237076f6a911fa6

    SHA1

    8b133ac5b1cf74bf3b16e884e6baab39cdb4459b

    SHA256

    a4e50cd05157c51131be211f07654e884defb398916a4ddaec3f8b93296fa594

    SHA512

    a0fd53af659e435c8961971012afbbf01008d1b233c63d21f1aa46595107e0b4b7736fd82acd18d67548073b88312facc14b74c767be8fc6f1ca6f4a0ae6ad87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    014104325c5a1260fa835acbd38eadc6

    SHA1

    5dafa9c03f4306d6e1f791fd72f45a8481a4bd98

    SHA256

    3aecb1738fb38e26c491d014d30a25cd82d81d7ec29ef1d4f44fd139d5708e38

    SHA512

    f0c73f3cc7eaacdc320e147324d9bcfcb00ebff56ad6d38bc73526334b6dee76938ee4573555cf8ad0a19a10ef9ede8bcec5e6eebecbe301c466cfe951a406ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4ce9defa41da551dbc467100d1b46d9b

    SHA1

    f59ded8cb1f0c2a28676753099700df19b633204

    SHA256

    d69b0b6f3de4396a2ab6ad0ef7fc4577f34f902d25d86291624331a426f57949

    SHA512

    01aca16d5a9548784bf8d01c97140c5a67ea68e0a5cf6f2ec1ec09b967056e27a08b582fa4f4e840b74bf00397d253e8294c2e3500fe7f40fc090b1f7c6350b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5b1912c84c932d7db0e2bdab6573c05d

    SHA1

    833f1547d5343c4e77c58ff3553c0abc4a7436a2

    SHA256

    53606bf250d4f24658bb9d4dbbd3e69032fd3f499be3432eb17c31fe121d093f

    SHA512

    ab1072d5df741493755d0d653909268512597a03501c783cb0bb2be58cd74637afb3d8f73050f7aec5960807680d5d791c7fec0ca66806c65f2bf1d3b14790c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ef0bf0e8f0d86d395a7488884a6a4e29

    SHA1

    dd4e4b8fe0f60b7ca5a5908dedf030c46f4a7e3e

    SHA256

    c999e7b035a73867913f926c5366f267dabb98c75be9ea5b42ea4472df1e3b1b

    SHA512

    91e16e2a87f197c699d74eb5e80f70ce57138fb2f1017132973f0f5dcdf8a302858531e31aa6982ec1def34195a27d09e726c2c6f195a7feae29c819e450c3cf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e7ab2932c6ed4943cb548219fb47de74

    SHA1

    2d25466e35e8a17771ad28fc4c7a702fed2399d2

    SHA256

    279b2a325b5771a31f32ea6cf3e56534151cf98e7714eada699eb809ae37ef9f

    SHA512

    7f67bf95ddfd1ae0c95024d403b85bf996d8931a5c0bf689ee48e879804077ec31f4652d15203dd674a270e14e564029d031286b00d26bf7910546dffb814d5a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7aa168a4aefe397aa76da71a8f0b1a3a

    SHA1

    ccecb7364b5f640c6c652ce43bb0ed8f4f3125ec

    SHA256

    d4ae844ee3fec27e212fa69cc6d401224965217c08ac292dc161d3391e0d7a5f

    SHA512

    1ffde3d6d701fc9eee0d55b63c1e639ddfda984755c997a012377a8e87eae7017295e13c88d47b606d3658da435ad85ab6e92cc5babff15d544c1891b3cc734b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a9b700227671a74db67a577f45a7bd52

    SHA1

    ded207a03a575949312cf777cbd15acf89904d00

    SHA256

    53d3cd4bb850812cfdcc473aca61d7ff6d9ad0456ae9249cfe0525d27a539ab8

    SHA512

    aab0a1cc0929d4915fad06d33beb8cb5d6e82cc2d515d9d4280ea60815a00ccf1fe1b18aa73fe8b4ead45ae6ddbe21baf3ffabc0b1402c0d80755f94d9b62a97

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    84efe7221cdea939695934a988548aa3

    SHA1

    b1fe77e58d5d3e929b8660d91e3d8417d8ff4259

    SHA256

    7ef190bbda8f0e531027f9bfc87f80fd96b8794f4f329b28447e8cf3f4d7d3e4

    SHA512

    61f818cacd207c65dd32543c8b89441cd14646ebf1d33f4ea26345c3130686a8dfc078f89bb29a8bb0b7998a937b04ac33fe056b5684d52d21c92169e456f722

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\62yy7f8\imagestore.dat

    Filesize

    19KB

    MD5

    208125c0cd3b842989169563b3f7c94d

    SHA1

    a5cd07cf38912a8dc04b9d2dfb26b17d56dae8d9

    SHA256

    04062bb8ee0a3d9d90d6590921e382354bdb11ced6eb9b06ef33857f8a4c9acd

    SHA512

    f68065bd4daacecf123141cce4fe665945295f66754d401444d6c4e3c63b0cb3e94800d1bcded34ae9c0cfb390a6b3d255bd242cfb4f2aa308528fbc0e2d0a35

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VQ77JNZF\analytics[1].js

    Filesize

    49KB

    MD5

    54e51056211dda674100cc5b323a58ad

    SHA1

    26dc5034cb6c7f3bbe061edd37c7fc6006cb835b

    SHA256

    5971b095cff574a66d35ada016d4c077c86e2dea62e9c0f14cf7c94b258619de

    SHA512

    e305d190287c28ca0cc2e45b909a304194175bb08351ad3f22825b1d632b1a217fb4b90dfd395637932307a8e0cc01da2f47831fa4eda91a18e49efe6685b74b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VQ77JNZF\favicon[1].ico

    Filesize

    15KB

    MD5

    e15402a41f04d656bceedb8d0a3ea40a

    SHA1

    31fee0b94d2a286a3d9b8094d5549a9ab1def5b0

    SHA256

    d8004341ba5458033d06eaa55af945a158f0bf170c5cbfb30a626e930e048bbe

    SHA512

    ffe902b3466bd6e96110ffe20a800b96a82f4042a6826fcea1750d0ffdde0aacc164aca51bceda7bdfef5047fcd41bb2026ba1e3b5109888396847881e944470

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VQ77JNZF\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab9669.tmp

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\Cab96D8.tmp

    Filesize

    61KB

    MD5

    e71c8443ae0bc2e282c73faead0a6dd3

    SHA1

    0c110c1b01e68edfacaeae64781a37b1995fa94b

    SHA256

    95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

    SHA512

    b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

  • C:\Users\Admin\AppData\Local\Temp\Tar9798.tmp

    Filesize

    161KB

    MD5

    be2bec6e8c5653136d3e72fe53c98aa3

    SHA1

    a8182d6db17c14671c3d5766c72e58d87c0810de

    SHA256

    1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

    SHA512

    0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\2XK1HS64.txt

    Filesize

    608B

    MD5

    aa38d174f35130f5006a42a268ed8e3f

    SHA1

    b94d1077bc992b183019747c52c20748daba8617

    SHA256

    1d178a3615a15f99c28bc8ba21ebe22d80b4c8008a9d5097a397f1e5426dd82b

    SHA512

    968bff5bd9dd80a02037e25c79c96675b227c9a46133e58d98d82dda70cde8d8836442e1d72db0f95cc3da345f76ba18893fd12ac5e35656714fa3181e2e46fc

  • memory/2036-1119-0x0000000000400000-0x0000000000C1E000-memory.dmp

    Filesize

    8.1MB

  • memory/2036-1120-0x0000000000400000-0x0000000000C1E000-memory.dmp

    Filesize

    8.1MB

  • memory/2036-1121-0x0000000000400000-0x0000000000C1E000-memory.dmp

    Filesize

    8.1MB

  • memory/2036-1122-0x0000000000400000-0x0000000000C1E000-memory.dmp

    Filesize

    8.1MB

  • memory/2036-165-0x0000000000400000-0x0000000000C1E000-memory.dmp

    Filesize

    8.1MB

  • memory/2036-688-0x0000000000400000-0x0000000000C1E000-memory.dmp

    Filesize

    8.1MB

  • memory/2036-1154-0x0000000000400000-0x0000000000C1E000-memory.dmp

    Filesize

    8.1MB

  • memory/2036-1155-0x0000000000400000-0x0000000000C1E000-memory.dmp

    Filesize

    8.1MB

  • memory/2036-1156-0x0000000000400000-0x0000000000C1E000-memory.dmp

    Filesize

    8.1MB

  • memory/2036-1157-0x0000000000400000-0x0000000000C1E000-memory.dmp

    Filesize

    8.1MB

  • memory/2036-1158-0x0000000000400000-0x0000000000C1E000-memory.dmp

    Filesize

    8.1MB