Resubmissions

12/07/2023, 21:25

230712-z9pxfsff8v 7

12/07/2023, 21:20

230712-z6psaaef88 7

Analysis

  • max time kernel
    157s
  • max time network
    194s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    12/07/2023, 21:20

General

  • Target

    SPOILER_steamcode.exe

  • Size

    5.9MB

  • MD5

    4bf7fca667001b939575ab9de908fae0

  • SHA1

    c7072f49b914697ab39a220ce06a646be7999e94

  • SHA256

    81e77a4ca34a5da5c1053ff4b22de0f3c068549db48d29c0d5a4dc64fbe481ee

  • SHA512

    d24d6ec80cf3d745c11ec385ac7603f329e36ce086cf9bb1ac23f4876ea2c6ea8acde85699c556e9f73879dc97b0df5353a88a825f8292bcdfc323b663a9fb18

  • SSDEEP

    98304:LE85ttb6UCV5ICDtPfeE/joG4Ku1+sKsXJOLgTs5m2uTAgeMkeAhpjGdPHqG:LE0G5ICteEroGNE+sKsXXgITjkeWpjGk

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 7 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SPOILER_steamcode.exe
    "C:\Users\Admin\AppData\Local\Temp\SPOILER_steamcode.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2488
    • C:\Users\Admin\AppData\Local\Temp\SPOILER_steamcode.exe
      "C:\Users\Admin\AppData\Local\Temp\SPOILER_steamcode.exe"
      2⤵
      • Loads dropped DLL
      PID:2864
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:524
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe"
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:828
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:828 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1860

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

      Filesize

      914B

      MD5

      e4a68ac854ac5242460afd72481b2a44

      SHA1

      df3c24f9bfd666761b268073fe06d1cc8d4f82a4

      SHA256

      cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

      SHA512

      5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

      Filesize

      252B

      MD5

      137ebaac2edb65f8dd0536a3d05310db

      SHA1

      51ff1c9354ffa64c096bc3d80f786c8926fc2a15

      SHA256

      a67f5fd62a6b331ac49f662f3417399e1b561b1cb256232af623a9789a30084d

      SHA512

      327ffefcb7c9d61e16aa2306dd405143c6edbeead2fabf55ad77a7f5e4e81a00448a413adf4e1be1106023cfdbb274026738a890f9dd63139f9347b1303a1c5d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      1dd8f592f394c9862f51338ff18a9ed3

      SHA1

      889352245da86bf57d2971b4e92aab18e8ee02fc

      SHA256

      df8e2e1edd5b4976eec8c7c3cae62896c0e60514c8f5c384fa7cfdabf2d617e3

      SHA512

      ca39101fdbf2456f04be692aa76c01f766c687210896ae818be81b6646251e14a3fb78415425572043a6ded0c172cbb5ef58556eb8115255da6b15e6a3f59298

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      79c1703488bbb9b5105574f81b459eb5

      SHA1

      e8969b013d13200342eda7dae904880b014ca8b0

      SHA256

      c0d2841e777bd15991edaaa9264f61bf0bcd5571f5cb8efbd666b47d9af24f74

      SHA512

      7731cbcd2a626f6df7d6a4df3989844fba6b0c3915379843909f34c9816c5ad703c24c403db568778f42d83f9ea903fb27b2600941e861bf4017172c608ef638

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      0aad4eb1a93cdd627669935024e27573

      SHA1

      57cbbcafcc86c7cdfd072062204636e162f90719

      SHA256

      cf8b025c68832debc8b326795b48178152efd64b9d07b37775a0b85e5034ddcc

      SHA512

      120ada95328d7894bd7ed15a0e8ba8aeb0f0bb78ea9bcefb801fe59ad1df3e1780d8645fb7182b1e0939e8eb70f560c4754f0be2d0dc51f06ae52cbc5a8d6b01

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      cfc4d1703c21dab846777dd2d09c0f39

      SHA1

      d5deda5781ec515c9e47fc45dc702e92d536b4cc

      SHA256

      a05263de60e2bf79db1b6660d84b0e457492ca29e05d43c69f46f399e083b55c

      SHA512

      5464294add50c0ae89ad4f59acdfc216459ee42708d9d45a1313518c9e04258353d6297624fa5029d4ec57f74c152ba39b64a6f9e8dffa93d96f920999100ce5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      9fccd044977773e619068f1dfd9d1391

      SHA1

      f8e1e4b48ddafec00503fbb56fb99377c077e887

      SHA256

      348c210eb3bd1fecb28cc72b03f89c1605be3e0a91d7ee6716739ad94726f869

      SHA512

      f34d9a96c5bb8c752ab4126b1dcaaefb4d3ba0c7289dcb9ccbb53d1e6da9138a2a11426dbce5c2945d7753575e3cb821f1330184089cbffec387df9d95ab5b26

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      0478a59f3aae7ad3ef37f7c66ef051d7

      SHA1

      3a7069a9a9e9d24b42fc5c60dd13a50db1f20763

      SHA256

      3442973cd73e2139f0e403e79b803e14c21fd7e17673f0642f5e0ee3ff029a33

      SHA512

      18fb9e83c110b5273981f3857163c0c68492151c541b666801c7401df9949cbc043b0a5bdb70f0c9aa18cac85795a2fcd5e41197025c3399dc4494a08be41e38

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      db9b0cb784b77cb55f0ba574c9b69b35

      SHA1

      356d907eede5a543a29403341628e45a37e4edee

      SHA256

      6c6c41c5b031ed4030db8254ae0c78020930b5e6d915fa025593ba3cab9d9c8f

      SHA512

      5bdfa5d1ab5e1ca3cbd2fead55d7a480f8c6c7c6c2c2308af0adbd31308a850ee0a0647ff7a0a9a3e083d429433af933a05613aa7eebb6aab06e8dcbf0f181f4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      3397148648958004ea6f5a7350428f41

      SHA1

      92315594147c98003895f68981133477cac59cde

      SHA256

      7593ccac7290e930f64885d2132081c10d91a4ed80ee1552302d7af7a60713ec

      SHA512

      c23047cf4ceaf098daf616a1f4640426e5de84e10f0e43c6c6cd50f41e58c9c946dcfac7a7a5764662cc8a4f675cd9515bc779fc7cd0ab1706b04eaa254283a9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      64a26412bf459ec6c4c37987bc716126

      SHA1

      d1cb650bc67ebe37efef70d350b3800b474a5de2

      SHA256

      c0911ac71ea0d57a73093c916f7d74c95f471f9f5c898676ddf4ac10492dd1cd

      SHA512

      874edae1b8bf122ac83b413a18b7c6918e2ede6a1356f341fad5e6e94cb6f8ff5f8cda814946e7790649ab6e4381754e4332474fb437be2972aab02b9522c431

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      a7201caa3d80eda33a01dfb05bb0fb48

      SHA1

      b6166107c5d9c3355f39b58aa84b016397129206

      SHA256

      514b55a061b177cbafa8033d9e06c036b53b5a17c491c4d7564c5892765ed9e6

      SHA512

      1abec0ba989b81a60594b5250306924ce132150c01af5f55742bec8c19de36d4d8cff62fbdd610c801c77316b3f746821d2027bf1d1efba3547624fe54d26f35

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B9M1KBX1\qsml[1].xml

      Filesize

      529B

      MD5

      43221dc4af6b07e3a82b6c6b3f98d3a1

      SHA1

      4870bcf9fc697be0d0f9b1c900273669f96957b0

      SHA256

      4b90f81a1445f9da4e532955b5967f6f1580633fd5e5a837d6ae4b4dc20f9f93

      SHA512

      452c2d706239149f39d3f5c08d5cbe584bd86f62089418019ba324c35c872134d3bc27c2a9d6ec27612dbed9ac3c0e8b12911d2081cb830e686b7aa49bc04ab0

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B9M1KBX1\qsml[2].xml

      Filesize

      469B

      MD5

      22e7936319ed0fcf8f939e7e99859b4f

      SHA1

      e95de500fc22a25bd48cfbf3c6fff14f41c3e4d0

      SHA256

      701b782ef4e784eb5a99ff80126d0fe5b8dcb3bfab12ae9106a7e5d9e7bfe152

      SHA512

      85069ea816b0025abfd67a2fde662c65b2731e9b726e96ebdd65f500a1edb8fac917b7ee434ed80f1580c09aee06cc0c516984b411516eb14b995914f9f1b727

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B9M1KBX1\suggestions[1].en-US

      Filesize

      17KB

      MD5

      5a34cb996293fde2cb7a4ac89587393a

      SHA1

      3c96c993500690d1a77873cd62bc639b3a10653f

      SHA256

      c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

      SHA512

      e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

    • C:\Users\Admin\AppData\Local\Temp\Cab786E.tmp

      Filesize

      62KB

      MD5

      3ac860860707baaf32469fa7cc7c0192

      SHA1

      c33c2acdaba0e6fa41fd2f00f186804722477639

      SHA256

      d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

      SHA512

      d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

    • C:\Users\Admin\AppData\Local\Temp\Tar7AC1.tmp

      Filesize

      164KB

      MD5

      4ff65ad929cd9a367680e0e5b1c08166

      SHA1

      c0af0d4396bd1f15c45f39d3b849ba444233b3a2

      SHA256

      c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

      SHA512

      f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

    • C:\Users\Admin\AppData\Local\Temp\_MEI24882\api-ms-win-core-file-l1-2-0.dll

      Filesize

      11KB

      MD5

      5e2a9b9d83d943c4af82b6dc829bfe97

      SHA1

      22654769e7c79f1aa0e96a4c16dcb9ef865737aa

      SHA256

      902ffc6e350772803ac35568364005c09be5c5e5d3f18038e46e9316aed217ef

      SHA512

      d4a018aed49c84706038e118058832fe26d2727445bd6f4798ba9548f8afc5e746bde7a7329b0be5ddd106707983783932e7351b101cb729070b68c91c660ac0

    • C:\Users\Admin\AppData\Local\Temp\_MEI24882\api-ms-win-core-file-l2-1-0.dll

      Filesize

      11KB

      MD5

      17468cdcf52d507d7d1a740323bad663

      SHA1

      c647494e52d5dde86bde8d850b1a49cd17024ade

      SHA256

      ae7f15d92e43bfb351363d149c89a0fad8453e2b2d08fdcb4d224c535a648fa1

      SHA512

      fef4616c4fd1521ca500fda0fac947e96a4b89b48c98847b23f42c6e8a34073076a39bcece01f19c546d0a734a9b688948fc34d425fd1ef36dffc378335881ae

    • C:\Users\Admin\AppData\Local\Temp\_MEI24882\api-ms-win-core-localization-l1-2-0.dll

      Filesize

      14KB

      MD5

      3991a12b40096a59d48a95b54ad1c812

      SHA1

      464da16182fd1053f4633b29e83d9afdfc39f1e1

      SHA256

      2ee4d131e5492a9980efa47ae5a9e1aad3d5bccb062c26d28cb0c9559e973481

      SHA512

      5bfd17e39c4ff999db7f36fe2dd044df346f1ea352098b4e3033c7ff8c382d7f2897c46ad543266d72a29561b984667c8d0dc1d2a163e3fab67bbaf10ae17085

    • C:\Users\Admin\AppData\Local\Temp\_MEI24882\api-ms-win-core-processthreads-l1-1-1.dll

      Filesize

      12KB

      MD5

      7922c25a9a206110d298eb1adb747dd7

      SHA1

      c4431817fbc6d39b6504c121a8775f174f6cb9d3

      SHA256

      0528474ae1b64b2ef0089b87d53d84a36b5792c381ea9459ceda87a29c5abb2a

      SHA512

      f90f86d6ccd18ddf292115a8a45a22248683460a8b90d371d42d5274f596bd91c4ef4b62531e00ea304cb99b239c6b7bd50d0a39db45e539649ff6622cfaa48c

    • C:\Users\Admin\AppData\Local\Temp\_MEI24882\api-ms-win-core-timezone-l1-1-0.dll

      Filesize

      12KB

      MD5

      8e0be9b6baceb5babc308039618870e5

      SHA1

      515d98afb7d0c17861bc87b83d553d4e80ecf8fb

      SHA256

      83ea1b0e636eac733c221a4fff4ab19371d8dacb8e80fa8295d86fe72bd2942c

      SHA512

      b14755c0192560f3c535895d7013eb39e62f2d17a26747518828bed5a17668932e6ea60d00d9a798298cf3a391c0c48b3de23207a2b64e1e79b6f93fb5a1a249

    • C:\Users\Admin\AppData\Local\Temp\_MEI24882\python310.dll

      Filesize

      4.3MB

      MD5

      316ce972b0104d68847ab38aba3de06a

      SHA1

      ca1e227fd7f1cfb1382102320dadef683213024b

      SHA256

      34f0e44a0d089587e1ea48c1cc4c3164a1819c6db27a7c1b746af46d6388c26e

      SHA512

      a11da6590a71d977c62b1c26c275763413f6a455e6d85fa052654d05d845dbbe8122bbd8e0a23887f9873d4291382ebbd5df19674ad2dda1cf0ff3206054939b

    • C:\Users\Admin\AppData\Local\Temp\_MEI24882\ucrtbase.dll

      Filesize

      986KB

      MD5

      1268674e0227fba666728f77e9ba01bd

      SHA1

      bfb0c3b94319d2e524a0b9246b45edbd3f90c3da

      SHA256

      6dada6c2ae69c792cfb3e90aac122810052d845ce875364bde885eef4f8fe9c4

      SHA512

      82a7956ebbd491294728ffb07f7d7effac44578bf4fb579449e129fca007271d5c211fe17e195c419c813280f2abe229fdfe805221e0325305e71ea04a361b50

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\CKLIW0V6.txt

      Filesize

      601B

      MD5

      994b978f9295a391f09794ea36b531cf

      SHA1

      5246e318afffd78ea38e7c530dc944ff12084dbd

      SHA256

      4f814436801103a589e7e4db720adbc02c4c65661b17186636c67f58e72436ba

      SHA512

      11789fdbacc7cfb90b77b2bc3da9e36a66ad2260e2c666628d8074f50b97a81c0cbe4772e0b03d50debe519e0ead04c877912ac766f9018ed84016e7bd70f238

    • \Users\Admin\AppData\Local\Temp\_MEI24882\api-ms-win-core-file-l1-2-0.dll

      Filesize

      11KB

      MD5

      5e2a9b9d83d943c4af82b6dc829bfe97

      SHA1

      22654769e7c79f1aa0e96a4c16dcb9ef865737aa

      SHA256

      902ffc6e350772803ac35568364005c09be5c5e5d3f18038e46e9316aed217ef

      SHA512

      d4a018aed49c84706038e118058832fe26d2727445bd6f4798ba9548f8afc5e746bde7a7329b0be5ddd106707983783932e7351b101cb729070b68c91c660ac0

    • \Users\Admin\AppData\Local\Temp\_MEI24882\api-ms-win-core-file-l2-1-0.dll

      Filesize

      11KB

      MD5

      17468cdcf52d507d7d1a740323bad663

      SHA1

      c647494e52d5dde86bde8d850b1a49cd17024ade

      SHA256

      ae7f15d92e43bfb351363d149c89a0fad8453e2b2d08fdcb4d224c535a648fa1

      SHA512

      fef4616c4fd1521ca500fda0fac947e96a4b89b48c98847b23f42c6e8a34073076a39bcece01f19c546d0a734a9b688948fc34d425fd1ef36dffc378335881ae

    • \Users\Admin\AppData\Local\Temp\_MEI24882\api-ms-win-core-localization-l1-2-0.dll

      Filesize

      14KB

      MD5

      3991a12b40096a59d48a95b54ad1c812

      SHA1

      464da16182fd1053f4633b29e83d9afdfc39f1e1

      SHA256

      2ee4d131e5492a9980efa47ae5a9e1aad3d5bccb062c26d28cb0c9559e973481

      SHA512

      5bfd17e39c4ff999db7f36fe2dd044df346f1ea352098b4e3033c7ff8c382d7f2897c46ad543266d72a29561b984667c8d0dc1d2a163e3fab67bbaf10ae17085

    • \Users\Admin\AppData\Local\Temp\_MEI24882\api-ms-win-core-processthreads-l1-1-1.dll

      Filesize

      12KB

      MD5

      7922c25a9a206110d298eb1adb747dd7

      SHA1

      c4431817fbc6d39b6504c121a8775f174f6cb9d3

      SHA256

      0528474ae1b64b2ef0089b87d53d84a36b5792c381ea9459ceda87a29c5abb2a

      SHA512

      f90f86d6ccd18ddf292115a8a45a22248683460a8b90d371d42d5274f596bd91c4ef4b62531e00ea304cb99b239c6b7bd50d0a39db45e539649ff6622cfaa48c

    • \Users\Admin\AppData\Local\Temp\_MEI24882\api-ms-win-core-timezone-l1-1-0.dll

      Filesize

      12KB

      MD5

      8e0be9b6baceb5babc308039618870e5

      SHA1

      515d98afb7d0c17861bc87b83d553d4e80ecf8fb

      SHA256

      83ea1b0e636eac733c221a4fff4ab19371d8dacb8e80fa8295d86fe72bd2942c

      SHA512

      b14755c0192560f3c535895d7013eb39e62f2d17a26747518828bed5a17668932e6ea60d00d9a798298cf3a391c0c48b3de23207a2b64e1e79b6f93fb5a1a249

    • \Users\Admin\AppData\Local\Temp\_MEI24882\python310.dll

      Filesize

      4.3MB

      MD5

      316ce972b0104d68847ab38aba3de06a

      SHA1

      ca1e227fd7f1cfb1382102320dadef683213024b

      SHA256

      34f0e44a0d089587e1ea48c1cc4c3164a1819c6db27a7c1b746af46d6388c26e

      SHA512

      a11da6590a71d977c62b1c26c275763413f6a455e6d85fa052654d05d845dbbe8122bbd8e0a23887f9873d4291382ebbd5df19674ad2dda1cf0ff3206054939b

    • \Users\Admin\AppData\Local\Temp\_MEI24882\ucrtbase.dll

      Filesize

      986KB

      MD5

      1268674e0227fba666728f77e9ba01bd

      SHA1

      bfb0c3b94319d2e524a0b9246b45edbd3f90c3da

      SHA256

      6dada6c2ae69c792cfb3e90aac122810052d845ce875364bde885eef4f8fe9c4

      SHA512

      82a7956ebbd491294728ffb07f7d7effac44578bf4fb579449e129fca007271d5c211fe17e195c419c813280f2abe229fdfe805221e0325305e71ea04a361b50