Overview
overview
10Static
static
1dHogwarts ...on.dll
windows7-x64
1dHogwarts ...on.dll
windows10-2004-x64
1dHogwarts ...er.dll
windows7-x64
1dHogwarts ...er.dll
windows10-2004-x64
1dHogwarts ...er.dll
windows7-x64
1dHogwarts ...er.dll
windows10-2004-x64
1dHogwarts ...ce.dll
windows7-x64
1dHogwarts ...ce.dll
windows10-2004-x64
1dHogwarts ...in.xml
windows7-x64
1dHogwarts ...in.xml
windows10-2004-x64
1dHogwarts ...ls.xml
windows7-x64
1dHogwarts ...ls.xml
windows10-2004-x64
1dHogwarts ...up.exe
windows7-x64
10dHogwarts ...up.exe
windows10-2004-x64
10Analysis
-
max time kernel
103s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
22-03-2023 04:37
Static task
static1
Behavioral task
behavioral1
Sample
dHogwarts Legacy/Data/Debug/Addition.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
dHogwarts Legacy/Data/Debug/Addition.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
dHogwarts Legacy/Data/Debug/Cracker.dll
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
dHogwarts Legacy/Data/Debug/Cracker.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
dHogwarts Legacy/Data/Debug/Helper.dll
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
dHogwarts Legacy/Data/Debug/Helper.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
dHogwarts Legacy/Data/Debug/Resource.dll
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
dHogwarts Legacy/Data/Debug/Resource.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
dHogwarts Legacy/Data/Packaged/Main.xml
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
dHogwarts Legacy/Data/Packaged/Main.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
dHogwarts Legacy/Data/Packaged/Utils.xml
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
dHogwarts Legacy/Data/Packaged/Utils.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
dHogwarts Legacy/setup.exe
Resource
win7-20230220-en
General
-
Target
dHogwarts Legacy/Data/Packaged/Utils.xml
-
Size
1KB
-
MD5
73e051427246dd4ca45935b1a4bd7e2d
-
SHA1
7216f05041252f1c3a9d84aacdf84ef62f1a1045
-
SHA256
b7b8b412ab1e4f32da8a7cd42aeaa6e7d8d340cf14977d3e87f7d8f5eb689b0f
-
SHA512
3fc10dea91962244389214d189c141466f5630e99b01af5761738ce884df14050cd08a43802dc45bbe9117290c34143b85a75694b6301954b51972180dca1e36
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "386228513" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c8a3886e844ee04ca528537b5bc45899000000000200000000001066000000010000200000005ef33bb598b7f07f7a5e5c4dfbed52ab43331a4a71e7b295e6a1d694a816048e000000000e8000000002000020000000e643fbab2876e5dcd276f7721b0ad4355f10be3fb71c2de4c955b45d83001cfe20000000f4e90a86946f1ffc9e34202f68369a4a16a0c072cfffdb7a76f2e6e01e6ff72940000000e3bddb17a6d67ff9d0ea206e7db059bcb765b440732bca3fedb45fc85c3bf173100354cc9d9967ada22bca0c7e925b46041dc6a090fc1299fa0a2c7c1b38221e IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D7368C81-C873-11ED-9F32-72D88D434236} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4045b0ad805cd901 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 672 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 672 IEXPLORE.EXE 672 IEXPLORE.EXE 588 IEXPLORE.EXE 588 IEXPLORE.EXE 588 IEXPLORE.EXE 588 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1724 wrote to memory of 852 1724 MSOXMLED.EXE 29 PID 1724 wrote to memory of 852 1724 MSOXMLED.EXE 29 PID 1724 wrote to memory of 852 1724 MSOXMLED.EXE 29 PID 1724 wrote to memory of 852 1724 MSOXMLED.EXE 29 PID 852 wrote to memory of 672 852 iexplore.exe 30 PID 852 wrote to memory of 672 852 iexplore.exe 30 PID 852 wrote to memory of 672 852 iexplore.exe 30 PID 852 wrote to memory of 672 852 iexplore.exe 30 PID 672 wrote to memory of 588 672 IEXPLORE.EXE 31 PID 672 wrote to memory of 588 672 IEXPLORE.EXE 31 PID 672 wrote to memory of 588 672 IEXPLORE.EXE 31 PID 672 wrote to memory of 588 672 IEXPLORE.EXE 31
Processes
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\dHogwarts Legacy\Data\Packaged\Utils.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome2⤵
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:672 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:588
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ae91d6621dcf76edb4ca15c66fd6ab33
SHA1f8749f2ced506c726f214a552764e5ed6f9f4d0d
SHA2567fc527e6020f1f9c51c53308a663f4df831031715692b6f52d0b239c2f4a887c
SHA512cb6d4f52e9c723c0164659635cf65907d60d770ddf6b54141eeee63e796115a794ad111a914ca9ebb05c7ea301a9b0d4d7f41b68e74d24f5191aed3bfb6e12e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e0ab0d99e00df9b1a7589e9f5b1aa505
SHA1c2c18cf694e8d436df343b3577786c29fca7196b
SHA2563ee651a454301d6f353e3da9d90ee383b25da593dd6d655cad08dd1bf9705df6
SHA512a00228da0849f70662bba306d405329affb6f2051e606b9459815380eb982d96ea25b19ec0e4bf4e319cc8f6444c23e17e694238b6d2ef1ed7581791a5c104ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD577320a27d7a1105e1e5b5a9325108320
SHA1da4b743ac2ede0b5afdc6a7bfb4d679c0f5cb914
SHA256d651a9188e294c3fc4a7d5dd686da537e36cbf8a4e32330f76a48591cc848f25
SHA51246fb2cd2dc51b4fcd491d4c71912053647be1aeebe0cf44e869bee69ea30f2928f7bb495e7f0119a46cc84c4a65a1600d7f9856ff41c62b4b607c2d987ebc8d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a190b7d986439eadb7654d999bb960c8
SHA1a463414d100da4b248fd49019271fa4bc8198357
SHA256dcf10112de7acd38e05b9aceacbfe30e01334b2c264b48215fe294ac0060d4a2
SHA51254f1d949377f5a21acc514e835fc68a09555b5956bdebd59967bd53f3b7731547db657150daf0d20c2d7e2850393af4a1123e4aa622300b6af44f0175b96d739
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a1929f78bb3f953ab0300c8dae462ad6
SHA1ee7ec2162e288c6bc05ac6ad37c52add83b508dd
SHA256e610352021e7f094e6d66ed25a6a2afb19e56ec76c9bf8236b2d7e96120e2abd
SHA51231ca5d32023ab91acc996223cca310c4f24997f39c7b9c289617ed436713f3fd187706c849e39cc5721d4873be48fb056be36d34e5262129f9167fdaa40d9e76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e8ac7261dad88de1a4406cd1d3ed0a3e
SHA1bfe72e1ad86d8b82fc9536a68fdc6f98b04881e1
SHA256f376d20237f639ad1ee76e22b26ddacff53284ffdaedb1cc226c6c8c51d90dbd
SHA512b586cf1587fb7d853f3706d0601768cd096d9e0a5c371a363f1f6a2ac6b60428b1fa05847d02c66642475f4e39378584e4bab9d744c38c54a7845a8e254a602b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56700cdae31ae4c91ad1d0ddbe463319f
SHA142c2e0816217e58f4724a84992e212f5cf5adfee
SHA256568736369e681303caa6189d273d64e2fbc6a1cda786ac2100ec3985d0b79b18
SHA5121a5ec643fed8733c77187ee6ea06b21e332f41cfb1e725b8d11b9f8bcd062b4c5d21ba395602b7e88f608ef7ec1157a616a82ab42dfa542755f14e4ffc32836f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53a42a36c86e9944629d815d701e24302
SHA1caae40023e18b83c57750455e58c692526b1ead9
SHA2560bf797d1cab198c2fe14971f8d4c59187c3103560690bc57a1acde3bae926fd6
SHA51295e762b04c02412af32a0c7a4423aa4f821fdc84cd91b2262b0d2ca6824ffd9152fa66743396853bb88d4c95f45c1ec732121709ce2b41b7f76d26c3f4c61c2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54934dd7e2bf7eeb292652390a61e73a6
SHA1ca956dcb19de2a8e507e2d440f6daad1913a4fc6
SHA2560fec0a2db6dff9fb5b7d6da1c576385cfe7b4e92e62bb63d0bc0e858b46fb304
SHA512ef83b4fd79c3d340408f70d3431ef2869d62b972598fa05bbebf752abdd55b6f85bdb9d56c3394d78cbbafc19f9160dcf86896a82c646bba6815710afb1fb025
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TOS3MI7U\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
Filesize
608B
MD57d63f8c020a2139718eefd7331d183ea
SHA1981c02f1c74d1f601aca90d6fbcd77eeba57c55f
SHA256fbc62cf50a55bc85c7bbb38c56fba88f88cbc6a953753fc78939a58522d037d5
SHA5126d26e6881f9f6d0caf94372b1a3bf31b2af56583b1d0b15d586c7ca2526c2bdcf88926c65b86e6224fde89141d6f4c0b0a166f98242a11ab6cac36441df3cff7