Analysis

  • max time kernel
    121s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    21-07-2023 06:54

General

  • Target

    Act I - Veda/Act I - Veda.exe

  • Size

    93.2MB

  • MD5

    2510ba102f89df229af25c71db8f9c18

  • SHA1

    6d811f81c1925eb109acfabb543dc2d45d8e1201

  • SHA256

    c3f69ff405518d61e6cff0443f4ddbe9a96c84d352efdfece8f2b7a1066d6d2c

  • SHA512

    88e7ae79ea2f026b09254d8a64d496a8d4b0a41eee7ef59da2b86eaede1b21fef1d39edc972901814d8d34c2c69b1aba3a55bb3eae7b028fce9963e2b25190f0

  • SSDEEP

    1572864:wdJvugr82jf19dUM/1T8+1VJRukUhkmG:wdhg6Pm

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Act I - Veda\Act I - Veda.exe
    "C:\Users\Admin\AppData\Local\Temp\Act I - Veda\Act I - Veda.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Users\Admin\AppData\Local\Temp\Act I - Veda\Act I - Veda.exe
      "C:\Users\Admin\AppData\Local\Temp\Act I - Veda\Act I - Veda.exe" --type=gpu-process --disable-features=SpareRendererForSitePerProcess --gpu-preferences=KAAAAAAAAACAAwAAAQAAAAAAAAAAAGAAAAAAAAEAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=6157604014799591070 --mojo-platform-channel-handle=1052 --ignored=" --type=renderer " /prefetch:2
      2⤵
        PID:2480
      • C:\Users\Admin\AppData\Local\Temp\Act I - Veda\Act I - Veda.exe
        "C:\Users\Admin\AppData\Local\Temp\Act I - Veda\Act I - Veda.exe" --type=renderer --disable-features=SpareRendererForSitePerProcess --service-pipe-token=614897897137596607 --lang=en-US --app-path="C:\Users\Admin\AppData\Local\Temp\Act I - Veda\resources\app.asar" --no-sandbox --no-zygote --preload="C:\Users\Admin\AppData\Local\Temp\Act I - Veda\resources\app.asar\preload.js" --background-color=#000000 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --service-request-channel-token=614897897137596607 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1568 /prefetch:1
        2⤵
        • Checks processor information in registry
        • Suspicious use of WriteProcessMemory
        PID:2756
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /d /s /c "%windir%\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1972
          • C:\Windows\System32\reg.exe
            C:\Windows\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid
            4⤵
              PID:780
        • C:\Users\Admin\AppData\Local\Temp\Act I - Veda\Act I - Veda.exe
          "C:\Users\Admin\AppData\Local\Temp\Act I - Veda\Act I - Veda.exe" --type=gpu-process --disable-features=SpareRendererForSitePerProcess --disable-gpu-sandbox --use-gl=disabled --gpu-preferences=KAAAAAAAAACAAwAAAQAAAAAAAAAAAGAAAAAAAAEAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=296555592842673655 --mojo-platform-channel-handle=1880 /prefetch:2
          2⤵
            PID:1776

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Incredibox\CURRENT

          Filesize

          16B

          MD5

          206702161f94c5cd39fadd03f4014d98

          SHA1

          bd8bfc144fb5326d21bd1531523d9fb50e1b600a

          SHA256

          1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

          SHA512

          0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

        • C:\Users\Admin\AppData\Roaming\Incredibox\CURRENT~RFf7725aa.TMP

          Filesize

          16B

          MD5

          46295cac801e5d4857d09837238a6394

          SHA1

          44e0fa1b517dbf802b18faf0785eeea6ac51594b

          SHA256

          0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

          SHA512

          8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

        • C:\Users\Admin\AppData\Roaming\Incredibox\Local Storage\leveldb\MANIFEST-000001

          Filesize

          41B

          MD5

          5af87dfd673ba2115e2fcf5cfdb727ab

          SHA1

          d5b5bbf396dc291274584ef71f444f420b6056f1

          SHA256

          f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

          SHA512

          de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

        • memory/2148-88-0x0000000001D70000-0x0000000001D71000-memory.dmp

          Filesize

          4KB

        • memory/2480-54-0x0000000000060000-0x0000000000061000-memory.dmp

          Filesize

          4KB

        • memory/2480-87-0x00000000770A0000-0x00000000770A1000-memory.dmp

          Filesize

          4KB