Analysis

  • max time kernel
    128s
  • max time network
    185s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-07-2023 23:41

General

  • Target

    Feed.and.Grow.Fish.v0.12.0.23/Feed and Grow.exe

  • Size

    20.3MB

  • MD5

    79853319c5343216a687066f2504d781

  • SHA1

    c8af33228c63aa4731d1d7d35f6cefe31309e212

  • SHA256

    020202cca85d7c01003b8b062eef89b9d7da92c622977edfd5b6f8fb5f61586a

  • SHA512

    f002184e59d83ae36a6a98a8bfa7e59ac9778828c2188d15742ae36e26ae90eefda479659657b1d38f9c1b8da8d130b5f0d99ae643cf0cac49bd64c6dd0eb604

  • SSDEEP

    393216:gzIhvTDsrB7wDkkXPjboYgIkLImtt51xpu8:c+4

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Feed.and.Grow.Fish.v0.12.0.23\Feed and Grow.exe
    "C:\Users\Admin\AppData\Local\Temp\Feed.and.Grow.Fish.v0.12.0.23\Feed and Grow.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Checks processor information in registry
    • Suspicious use of SetWindowsHookEx
    PID:788
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x2f4 0x3f8
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2156
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:116
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService
    1⤵
    • Drops desktop.ini file(s)
    • Checks processor information in registry
    • Modifies registry class
    PID:4920

Network

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Videos\Captures\desktop.ini
    Filesize

    190B

    MD5

    b0d27eaec71f1cd73b015f5ceeb15f9d

    SHA1

    62264f8b5c2f5034a1e4143df6e8c787165fbc2f

    SHA256

    86d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2

    SHA512

    7b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c

  • memory/788-133-0x0000000005A70000-0x0000000005B70000-memory.dmp
    Filesize

    1024KB

  • memory/788-134-0x0000000005420000-0x0000000005520000-memory.dmp
    Filesize

    1024KB

  • memory/788-149-0x0000000005A70000-0x0000000005B70000-memory.dmp
    Filesize

    1024KB

  • memory/788-150-0x0000000005420000-0x0000000005520000-memory.dmp
    Filesize

    1024KB