Analysis
-
max time kernel
45s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01/06/2023, 19:56
Static task
static1
Behavioral task
behavioral1
Sample
21486eb7f07e0cc98b11a4227383c5be93be58eeeb352a0a50973fc61c969a65.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
21486eb7f07e0cc98b11a4227383c5be93be58eeeb352a0a50973fc61c969a65.exe
Resource
win10v2004-20230220-en
General
-
Target
21486eb7f07e0cc98b11a4227383c5be93be58eeeb352a0a50973fc61c969a65.exe
-
Size
2.8MB
-
MD5
53b7229abf0a792ab697f8ae4e5f4708
-
SHA1
93a9f684957a99a54bc3a3b049117714a5933968
-
SHA256
21486eb7f07e0cc98b11a4227383c5be93be58eeeb352a0a50973fc61c969a65
-
SHA512
d5709f8f3c71edf48efabe5e0961a4715029050e2db59f060a6c7cb963510b8c76c07760089a97ee425ba7ce475dfc623d5643d8d87b024278c9e0fd04cc9951
-
SSDEEP
49152:bKhRYlGGbx4FBK3SVXiHCyDpeQxP18vS3bdFF7YaKBkOef:bYWGSx4iCMisRxPWS35RXO8
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 1332 Game.exe -
Loads dropped DLL 2 IoCs
pid Process 824 21486eb7f07e0cc98b11a4227383c5be93be58eeeb352a0a50973fc61c969a65.exe 1332 Game.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: Game.exe File opened (read-only) \??\H: Game.exe File opened (read-only) \??\I: Game.exe File opened (read-only) \??\V: Game.exe File opened (read-only) \??\J: Game.exe File opened (read-only) \??\P: Game.exe File opened (read-only) \??\R: Game.exe File opened (read-only) \??\Y: Game.exe File opened (read-only) \??\Z: Game.exe File opened (read-only) \??\Q: Game.exe File opened (read-only) \??\S: Game.exe File opened (read-only) \??\T: Game.exe File opened (read-only) \??\B: Game.exe File opened (read-only) \??\K: Game.exe File opened (read-only) \??\M: Game.exe File opened (read-only) \??\N: Game.exe File opened (read-only) \??\O: Game.exe File opened (read-only) \??\X: Game.exe File opened (read-only) \??\F: Game.exe File opened (read-only) \??\G: Game.exe File opened (read-only) \??\L: Game.exe File opened (read-only) \??\U: Game.exe File opened (read-only) \??\W: Game.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Game.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Game.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 824 21486eb7f07e0cc98b11a4227383c5be93be58eeeb352a0a50973fc61c969a65.exe 824 21486eb7f07e0cc98b11a4227383c5be93be58eeeb352a0a50973fc61c969a65.exe 824 21486eb7f07e0cc98b11a4227383c5be93be58eeeb352a0a50973fc61c969a65.exe 824 21486eb7f07e0cc98b11a4227383c5be93be58eeeb352a0a50973fc61c969a65.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe 1332 Game.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 824 21486eb7f07e0cc98b11a4227383c5be93be58eeeb352a0a50973fc61c969a65.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 824 wrote to memory of 1332 824 21486eb7f07e0cc98b11a4227383c5be93be58eeeb352a0a50973fc61c969a65.exe 30 PID 824 wrote to memory of 1332 824 21486eb7f07e0cc98b11a4227383c5be93be58eeeb352a0a50973fc61c969a65.exe 30 PID 824 wrote to memory of 1332 824 21486eb7f07e0cc98b11a4227383c5be93be58eeeb352a0a50973fc61c969a65.exe 30 PID 824 wrote to memory of 1332 824 21486eb7f07e0cc98b11a4227383c5be93be58eeeb352a0a50973fc61c969a65.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\21486eb7f07e0cc98b11a4227383c5be93be58eeeb352a0a50973fc61c969a65.exe"C:\Users\Admin\AppData\Local\Temp\21486eb7f07e0cc98b11a4227383c5be93be58eeeb352a0a50973fc61c969a65.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Roaming\Game\Game.exe"C:\Users\Admin\AppData\Roaming\Game\Game.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1332
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.8MB
MD55b43be674538a780d6192bbabcd51efb
SHA133e1839922bd22e6453c74de2eee1b9313ce8aff
SHA25690ba7d6f09f6db0dcf472472184d8b660f555eb85453c75ea6eefe91db817827
SHA512ea15fa5100dcc58c888f2386ef56a7586e6a577fdb12c1eb8859479527321eafdf1090d9252e2c34a5f7ae6a995a67e470abd23d323415e4e2a8a8bd0adb8328
-
Filesize
2.8MB
MD55b43be674538a780d6192bbabcd51efb
SHA133e1839922bd22e6453c74de2eee1b9313ce8aff
SHA25690ba7d6f09f6db0dcf472472184d8b660f555eb85453c75ea6eefe91db817827
SHA512ea15fa5100dcc58c888f2386ef56a7586e6a577fdb12c1eb8859479527321eafdf1090d9252e2c34a5f7ae6a995a67e470abd23d323415e4e2a8a8bd0adb8328
-
Filesize
2.8MB
MD55b43be674538a780d6192bbabcd51efb
SHA133e1839922bd22e6453c74de2eee1b9313ce8aff
SHA25690ba7d6f09f6db0dcf472472184d8b660f555eb85453c75ea6eefe91db817827
SHA512ea15fa5100dcc58c888f2386ef56a7586e6a577fdb12c1eb8859479527321eafdf1090d9252e2c34a5f7ae6a995a67e470abd23d323415e4e2a8a8bd0adb8328
-
Filesize
524KB
MD522778fe2ce597ba097b6e4fea9280e5a
SHA11c3efe529b92831c5d95e7546502f8fdd04999c6
SHA2561643e7747ccc437d0dda37cfc19faf391e4f3d0d5cd98ddb0b3f263d686b7464
SHA5127af6be5bb40211e9db943436605059f921a1b6ec706318044e916e42d15a0e61d83d0137bf0b0e170dd9f84b68aada24bc1e03c39d957848312d54d404a03a30
-
Filesize
1.4MB
MD50bab495585320facda593440369ce375
SHA1a9d56507f23f84bf683f909a9b8b2c39f72018c0
SHA25603f0b598a590b2cc016e0138bbfe1c26c88451432076441e62e494ba0115af11
SHA512e9e9527b7bb3d9da179d671040cb596a5a3d4b2d3b9ab36417a6891f1203c0b981f09bd35aa7a944b7ba0876be664ecfe1a62ca117c7c39a365afc9d61582600
-
Filesize
2.8MB
MD55b43be674538a780d6192bbabcd51efb
SHA133e1839922bd22e6453c74de2eee1b9313ce8aff
SHA25690ba7d6f09f6db0dcf472472184d8b660f555eb85453c75ea6eefe91db817827
SHA512ea15fa5100dcc58c888f2386ef56a7586e6a577fdb12c1eb8859479527321eafdf1090d9252e2c34a5f7ae6a995a67e470abd23d323415e4e2a8a8bd0adb8328
-
Filesize
1.4MB
MD50bab495585320facda593440369ce375
SHA1a9d56507f23f84bf683f909a9b8b2c39f72018c0
SHA25603f0b598a590b2cc016e0138bbfe1c26c88451432076441e62e494ba0115af11
SHA512e9e9527b7bb3d9da179d671040cb596a5a3d4b2d3b9ab36417a6891f1203c0b981f09bd35aa7a944b7ba0876be664ecfe1a62ca117c7c39a365afc9d61582600