Overview
overview
8Static
static
3Game.Launc...s.json
windows7-x64
3Game.Launc...s.json
windows10-2004-x64
3Game.Launcher.exe
windows7-x64
1Game.Launcher.exe
windows10-2004-x64
1Game.Launcher.exe
windows7-x64
1Game.Launcher.exe
windows10-2004-x64
8Game.Launc...g.json
windows7-x64
3Game.Launc...g.json
windows10-2004-x64
3version.txt
windows7-x64
1version.txt
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
09-06-2023 23:02
Static task
static1
Behavioral task
behavioral1
Sample
Game.Launcher.deps.json
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Game.Launcher.deps.json
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Game.Launcher.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
Game.Launcher.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
Game.Launcher.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
Game.Launcher.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
Game.Launcher.runtimeconfig.json
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
Game.Launcher.runtimeconfig.json
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
version.txt
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
version.txt
Resource
win10v2004-20230220-en
General
-
Target
Game.Launcher.deps.json
-
Size
68KB
-
MD5
c150a08eb3e64174ae1be7840387f023
-
SHA1
b9bedbb58fe29b7fbafde7065e1b8a508f5589ac
-
SHA256
b5128d9455b676a3605dad1ae22e58d053e5f6926a337879ffae4bf5e889732f
-
SHA512
3935beef60ec77da3c73e51b48077046292be423a63951f3313bd50d440df4dee3d02475fa854453581c5e9729f67aa697dd3660ada7fcf4e990f57614cff825
-
SSDEEP
768:n8alYu7VkBtRYzL1OoZcuonVSjd2OgXkaXnEroH3HutqO3zICsfhQB4:FlYu7VkBtRYzL1OoZcuonVSjS7he4
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\.json rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\.json\ = "json_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\json_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\json_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\json_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\json_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\json_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\json_auto_file\shell\Read\command rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1700 AcroRd32.exe 1700 AcroRd32.exe 1700 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1228 wrote to memory of 268 1228 cmd.exe 28 PID 1228 wrote to memory of 268 1228 cmd.exe 28 PID 1228 wrote to memory of 268 1228 cmd.exe 28 PID 268 wrote to memory of 1700 268 rundll32.exe 29 PID 268 wrote to memory of 1700 268 rundll32.exe 29 PID 268 wrote to memory of 1700 268 rundll32.exe 29 PID 268 wrote to memory of 1700 268 rundll32.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Game.Launcher.deps.json1⤵
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Game.Launcher.deps.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Game.Launcher.deps.json"3⤵
- Suspicious use of SetWindowsHookEx
PID:1700
-
-