Analysis

  • max time kernel
    139s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-04-2023 02:35

General

  • Target

    Gamesetup_x64.rar

  • Size

    56.5MB

  • MD5

    77c18aed888520664fe906cae2aa7859

  • SHA1

    89655fa405efb7e3d4046d7c5aca517548af6ddd

  • SHA256

    dbe5c0a473d5468520e3cf127c4e88a6e5ff26c205461f28a0a023de297b8381

  • SHA512

    7c174fabfedaa0718d442f69ce99fc89a3c620ec931e040428b15d7e41ab11e774e363a9a3531fdb709cce2d88a762df608a12fdeb74f70408a41722e2285ee2

  • SSDEEP

    786432:v7v+nGMHGwpylmUNsg4wevhJaoHPOCT1Bq+b/h4H3lo+Ueldq1t+2zlTNJWjvZDt:gG8pe24Y1dS+tel+AalTM53i4WpXlJnE

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 38 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Gamesetup_x64.rar
    1⤵
    • Modifies registry class
    PID:4460
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:940
    • C:\Program Files\7-Zip\7zG.exe
      "C:\Program Files\7-Zip\7zG.exe" "C:\Users\Admin\AppData\Local\Temp\Gamesetup_x64.rar"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4136
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4568
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2188
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffff1559758,0x7ffff1559768,0x7ffff1559778
        2⤵
          PID:4812
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1824 --field-trial-handle=1840,i,5890742781976878538,10256281560105752713,131072 /prefetch:2
          2⤵
            PID:2164
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 --field-trial-handle=1840,i,5890742781976878538,10256281560105752713,131072 /prefetch:8
            2⤵
              PID:2280
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2264 --field-trial-handle=1840,i,5890742781976878538,10256281560105752713,131072 /prefetch:8
              2⤵
                PID:3668
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3220 --field-trial-handle=1840,i,5890742781976878538,10256281560105752713,131072 /prefetch:1
                2⤵
                  PID:4372
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3356 --field-trial-handle=1840,i,5890742781976878538,10256281560105752713,131072 /prefetch:1
                  2⤵
                    PID:1400
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4484 --field-trial-handle=1840,i,5890742781976878538,10256281560105752713,131072 /prefetch:1
                    2⤵
                      PID:2516
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4696 --field-trial-handle=1840,i,5890742781976878538,10256281560105752713,131072 /prefetch:8
                      2⤵
                        PID:4904
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4844 --field-trial-handle=1840,i,5890742781976878538,10256281560105752713,131072 /prefetch:8
                        2⤵
                          PID:3644
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4876 --field-trial-handle=1840,i,5890742781976878538,10256281560105752713,131072 /prefetch:8
                          2⤵
                            PID:3108
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 --field-trial-handle=1840,i,5890742781976878538,10256281560105752713,131072 /prefetch:8
                            2⤵
                              PID:4828
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 --field-trial-handle=1840,i,5890742781976878538,10256281560105752713,131072 /prefetch:8
                              2⤵
                                PID:2076
                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                              1⤵
                                PID:4496

                              Network

                              MITRE ATT&CK Enterprise v6

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                Filesize

                                371B

                                MD5

                                01bbd56c28fb56c9d6dc0da364473ad6

                                SHA1

                                bc2f859a85f1a5a989e2ea8f697b3f68f9762044

                                SHA256

                                ad4268ab3c1edc411bbfbf5ff7fab14287ea561d3c29737c47ec9417a0aad1a8

                                SHA512

                                79f111f56f78ce92b3bfe58e85d586f5713cfb0512470c9d2760279ebe4f9720cbb1b60d4ce48cd86ae664517645bf0a51f8e01e3e63089fef4adde3f31e8872

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                f5a0e6f3563ad86e8ebb05a1cf6029a8

                                SHA1

                                dec65ca8711ef42d9a7890ce2f24c0c11c45bb5c

                                SHA256

                                5225027cf9d7eb7e3f6f52e5ef5f4f5e9fb9cd27700af403c09930bf3b063d0c

                                SHA512

                                d8c51f98cc937ec14488503adf27c956463737da9ea8ed1cf81f3e3a38fb7a9c948628034a163ee52c37507cd0da9430c6c481b90c56eca480459f56d3acfb1d

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                Filesize

                                15KB

                                MD5

                                a264c35988e028e462d0267b50236e60

                                SHA1

                                9d868bbd4c721700e23de434892101966a50fa7f

                                SHA256

                                247a2d28962b4dc08bd7d90ffeb7f33ba82a65e4bb0178f568e432cc14c262e9

                                SHA512

                                0e02a29fb46b4d455abbcbd945d3c9cd32251a2c98608626b7e0eed6a80f1d22160b07709faecc7f4102abccada7225a403f42bad6f6fe27158a7e59df2e9b7f

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                173KB

                                MD5

                                dd1c6d39bca79740b7aea25322de2d39

                                SHA1

                                a528891c9106e20b761bbd3965ea271043025abc

                                SHA256

                                3b5a4430504433f396005fde179a54aaf8c36ef419a9988cbc68c2bb85ac8ad6

                                SHA512

                                9ba74f64ab9ce574c3994e4a852832fac1fa8f4af5baccbb50c920770242d5c56261498644cde7a44417fa7fc9cd3b65d27b4a0ebff7b9b594b7c87833d92cae

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                Filesize

                                2B

                                MD5

                                99914b932bd37a50b983c5e7c90ae93b

                                SHA1

                                bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                SHA256

                                44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                SHA512

                                27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

                                Filesize

                                28KB

                                MD5

                                67b72d1039e17cb2a90faf5b2f6b23b1

                                SHA1

                                91fca1f9f5eba80be4b2a9465ae8913ea49b6f55

                                SHA256

                                3a93424a7eb21d973bddabf54cc58cb63862c2c8e2302b125c40cceab93957d0

                                SHA512

                                5b829c19be351707a9cf5e816b1579590ec275e43a3987e08e593239d5310a2b28763419940951c700d3ba7296a25ef11f202d3872acab9e7432e277989b336f

                              • \??\pipe\crashpad_2188_NRRNEPKLAJBNPFPE

                                MD5

                                d41d8cd98f00b204e9800998ecf8427e

                                SHA1

                                da39a3ee5e6b4b0d3255bfef95601890afd80709

                                SHA256

                                e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                SHA512

                                cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e