Analysis
-
max time kernel
114s -
max time network
110s -
platform
windows10-1703_x64 -
resource
win10-20230703-es -
resource tags
arch:x64arch:x86image:win10-20230703-eslocale:es-esos:windows10-1703-x64systemwindows -
submitted
15/07/2023, 21:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
game.exe
Resource
win10-20230703-es
6 signatures
1800 seconds
General
-
Target
game.exe
-
Size
3.9MB
-
MD5
6c5d61c870fce57ee036fe10b12a08ef
-
SHA1
fb768c2ce9bd9f52f8604eaa844e5b4b0e35f461
-
SHA256
c677aeb112ec0309f13ccb199040394d81829d7a8b7136044deb355d66391f6f
-
SHA512
149633f46bea056dcc0d7b04b7831af13e54b7d334f2994b02b900dc166b7e49564d4156cc0951bdc6324c207fc082355ba3a30a00e7128cf7db70b4d55dcff3
-
SSDEEP
49152:8P6aFKkB+h4xKPfLHuiYwUiZMX6paVkUWXHXt4Imo2jGyC4AboTQqt:CkcbVwtXQX
Score
4/10
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\INF\msmouse.PNF game.exe -
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 game.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags game.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 game.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags game.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-488886677-2269338296-1239465872-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-488886677-2269338296-1239465872-1000_Classes\Local Settings cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 196 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 196 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4588 game.exe 3812 OpenWith.exe 1140 OpenWith.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4588 wrote to memory of 4060 4588 game.exe 70 PID 4588 wrote to memory of 4060 4588 game.exe 70 PID 4588 wrote to memory of 3092 4588 game.exe 74 PID 4588 wrote to memory of 3092 4588 game.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\game.exe"C:\Users\Admin\AppData\Local\Temp\game.exe"1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start steam://store/18592902⤵
- Modifies registry class
PID:4060
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start steam://store/18592902⤵
- Modifies registry class
PID:3092
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3b41⤵
- Suspicious use of AdjustPrivilegeToken
PID:196
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:3812
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:1140