Analysis

  • max time kernel
    45s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01/06/2023, 19:56

General

  • Target

    21486eb7f07e0cc98b11a4227383c5be93be58eeeb352a0a50973fc61c969a65.exe

  • Size

    2.8MB

  • MD5

    53b7229abf0a792ab697f8ae4e5f4708

  • SHA1

    93a9f684957a99a54bc3a3b049117714a5933968

  • SHA256

    21486eb7f07e0cc98b11a4227383c5be93be58eeeb352a0a50973fc61c969a65

  • SHA512

    d5709f8f3c71edf48efabe5e0961a4715029050e2db59f060a6c7cb963510b8c76c07760089a97ee425ba7ce475dfc623d5643d8d87b024278c9e0fd04cc9951

  • SSDEEP

    49152:bKhRYlGGbx4FBK3SVXiHCyDpeQxP18vS3bdFF7YaKBkOef:bYWGSx4iCMisRxPWS35RXO8

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\21486eb7f07e0cc98b11a4227383c5be93be58eeeb352a0a50973fc61c969a65.exe
    "C:\Users\Admin\AppData\Local\Temp\21486eb7f07e0cc98b11a4227383c5be93be58eeeb352a0a50973fc61c969a65.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:824
    • C:\Users\Admin\AppData\Roaming\Game\Game.exe
      "C:\Users\Admin\AppData\Roaming\Game\Game.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Enumerates connected drives
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:1332

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Game\Game.exe

    Filesize

    2.8MB

    MD5

    5b43be674538a780d6192bbabcd51efb

    SHA1

    33e1839922bd22e6453c74de2eee1b9313ce8aff

    SHA256

    90ba7d6f09f6db0dcf472472184d8b660f555eb85453c75ea6eefe91db817827

    SHA512

    ea15fa5100dcc58c888f2386ef56a7586e6a577fdb12c1eb8859479527321eafdf1090d9252e2c34a5f7ae6a995a67e470abd23d323415e4e2a8a8bd0adb8328

  • C:\Users\Admin\AppData\Roaming\Game\Game.exe

    Filesize

    2.8MB

    MD5

    5b43be674538a780d6192bbabcd51efb

    SHA1

    33e1839922bd22e6453c74de2eee1b9313ce8aff

    SHA256

    90ba7d6f09f6db0dcf472472184d8b660f555eb85453c75ea6eefe91db817827

    SHA512

    ea15fa5100dcc58c888f2386ef56a7586e6a577fdb12c1eb8859479527321eafdf1090d9252e2c34a5f7ae6a995a67e470abd23d323415e4e2a8a8bd0adb8328

  • C:\Users\Admin\AppData\Roaming\Game\Game.exe

    Filesize

    2.8MB

    MD5

    5b43be674538a780d6192bbabcd51efb

    SHA1

    33e1839922bd22e6453c74de2eee1b9313ce8aff

    SHA256

    90ba7d6f09f6db0dcf472472184d8b660f555eb85453c75ea6eefe91db817827

    SHA512

    ea15fa5100dcc58c888f2386ef56a7586e6a577fdb12c1eb8859479527321eafdf1090d9252e2c34a5f7ae6a995a67e470abd23d323415e4e2a8a8bd0adb8328

  • C:\Users\Admin\AppData\Roaming\Game\config.ini

    Filesize

    524KB

    MD5

    22778fe2ce597ba097b6e4fea9280e5a

    SHA1

    1c3efe529b92831c5d95e7546502f8fdd04999c6

    SHA256

    1643e7747ccc437d0dda37cfc19faf391e4f3d0d5cd98ddb0b3f263d686b7464

    SHA512

    7af6be5bb40211e9db943436605059f921a1b6ec706318044e916e42d15a0e61d83d0137bf0b0e170dd9f84b68aada24bc1e03c39d957848312d54d404a03a30

  • C:\Users\Admin\AppData\Roaming\Game\nw_elf.dll

    Filesize

    1.4MB

    MD5

    0bab495585320facda593440369ce375

    SHA1

    a9d56507f23f84bf683f909a9b8b2c39f72018c0

    SHA256

    03f0b598a590b2cc016e0138bbfe1c26c88451432076441e62e494ba0115af11

    SHA512

    e9e9527b7bb3d9da179d671040cb596a5a3d4b2d3b9ab36417a6891f1203c0b981f09bd35aa7a944b7ba0876be664ecfe1a62ca117c7c39a365afc9d61582600

  • \Users\Admin\AppData\Roaming\Game\Game.exe

    Filesize

    2.8MB

    MD5

    5b43be674538a780d6192bbabcd51efb

    SHA1

    33e1839922bd22e6453c74de2eee1b9313ce8aff

    SHA256

    90ba7d6f09f6db0dcf472472184d8b660f555eb85453c75ea6eefe91db817827

    SHA512

    ea15fa5100dcc58c888f2386ef56a7586e6a577fdb12c1eb8859479527321eafdf1090d9252e2c34a5f7ae6a995a67e470abd23d323415e4e2a8a8bd0adb8328

  • \Users\Admin\AppData\Roaming\Game\nw_elf.dll

    Filesize

    1.4MB

    MD5

    0bab495585320facda593440369ce375

    SHA1

    a9d56507f23f84bf683f909a9b8b2c39f72018c0

    SHA256

    03f0b598a590b2cc016e0138bbfe1c26c88451432076441e62e494ba0115af11

    SHA512

    e9e9527b7bb3d9da179d671040cb596a5a3d4b2d3b9ab36417a6891f1203c0b981f09bd35aa7a944b7ba0876be664ecfe1a62ca117c7c39a365afc9d61582600

  • memory/824-59-0x0000000000120000-0x0000000000121000-memory.dmp

    Filesize

    4KB

  • memory/824-72-0x0000000000FD0000-0x000000000155B000-memory.dmp

    Filesize

    5.5MB

  • memory/824-65-0x0000000000150000-0x0000000000151000-memory.dmp

    Filesize

    4KB

  • memory/824-67-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/824-68-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/824-70-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/824-71-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/824-64-0x0000000000150000-0x0000000000151000-memory.dmp

    Filesize

    4KB

  • memory/824-62-0x0000000000130000-0x0000000000131000-memory.dmp

    Filesize

    4KB

  • memory/824-61-0x0000000000130000-0x0000000000131000-memory.dmp

    Filesize

    4KB

  • memory/824-55-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/824-57-0x0000000000120000-0x0000000000121000-memory.dmp

    Filesize

    4KB

  • memory/824-58-0x0000000000120000-0x0000000000121000-memory.dmp

    Filesize

    4KB

  • memory/824-56-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/824-54-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/1332-89-0x0000000010000000-0x0000000010048000-memory.dmp

    Filesize

    288KB