Overview
overview
7Static
static
7Sonic.EXE ...d .apk
android-9-x86
410 de 10.html
windows7-x64
110 de 10.html
windows10-2004-x64
1BfFuckingDies.html
windows7-x64
1BfFuckingDies.html
windows10-2004-x64
1Keel.html
windows7-x64
1Keel.html
windows10-2004-x64
1Milky.html
windows7-x64
1Milky.html
windows10-2004-x64
1a treta.html
windows7-x64
1a treta.html
windows10-2004-x64
1bothCredit...o.html
windows7-x64
1bothCredit...o.html
windows10-2004-x64
1can-can.html
windows7-x64
1can-can.html
windows10-2004-x64
1du ai luke...a.html
windows7-x64
1du ai luke...a.html
windows10-2004-x64
1f de fudeu.html
windows7-x64
1f de fudeu.html
windows10-2004-x64
1festinha.html
windows7-x64
1festinha.html
windows10-2004-x64
1soundtestcodes.html
windows7-x64
1soundtestcodes.html
windows10-2004-x64
1superidold...u.html
windows7-x64
1superidold...u.html
windows10-2004-x64
1tooslowcutscene1.html
windows7-x64
1tooslowcutscene1.html
windows10-2004-x64
1tooslowcutscene2.html
windows7-x64
1tooslowcutscene2.html
windows10-2004-x64
1truegameplay.html
windows7-x64
1truegameplay.html
windows10-2004-x64
1video.min.js
windows7-x64
1Analysis
-
max time kernel
120s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10/10/2023, 20:23
Static task
static1
Behavioral task
behavioral1
Sample
Sonic.EXE 2.0 Optimized .apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
10 de 10.html
Resource
win7-20230831-en
Behavioral task
behavioral3
Sample
10 de 10.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral4
Sample
BfFuckingDies.html
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
BfFuckingDies.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral6
Sample
Keel.html
Resource
win7-20230831-en
Behavioral task
behavioral7
Sample
Keel.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral8
Sample
Milky.html
Resource
win7-20230831-en
Behavioral task
behavioral9
Sample
Milky.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral10
Sample
a treta.html
Resource
win7-20230831-en
Behavioral task
behavioral11
Sample
a treta.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral12
Sample
bothCreditsAndIntro.html
Resource
win7-20230831-en
Behavioral task
behavioral13
Sample
bothCreditsAndIntro.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral14
Sample
can-can.html
Resource
win7-20230831-en
Behavioral task
behavioral15
Sample
can-can.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral16
Sample
du ai luke laike ai nidi yo poweee bruda.html
Resource
win7-20230831-en
Behavioral task
behavioral17
Sample
du ai luke laike ai nidi yo poweee bruda.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral18
Sample
f de fudeu.html
Resource
win7-20230831-en
Behavioral task
behavioral19
Sample
f de fudeu.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral20
Sample
festinha.html
Resource
win7-20230831-en
Behavioral task
behavioral21
Sample
festinha.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral22
Sample
soundtestcodes.html
Resource
win7-20230831-en
Behavioral task
behavioral23
Sample
soundtestcodes.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral24
Sample
superidoldexoneyobinikekienda mas miku.html
Resource
win7-20230831-en
Behavioral task
behavioral25
Sample
superidoldexoneyobinikekienda mas miku.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral26
Sample
tooslowcutscene1.html
Resource
win7-20230831-en
Behavioral task
behavioral27
Sample
tooslowcutscene1.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral28
Sample
tooslowcutscene2.html
Resource
win7-20230831-en
Behavioral task
behavioral29
Sample
tooslowcutscene2.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral30
Sample
truegameplay.html
Resource
win7-20230831-en
Behavioral task
behavioral31
Sample
truegameplay.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral32
Sample
video.min.js
Resource
win7-20230831-en
General
-
Target
truegameplay.html
-
Size
62KB
-
MD5
e895da4b1975f9c396d0a3acb524bfb7
-
SHA1
e0a3455f52bcc0bd72eed9dfd6f706806106401e
-
SHA256
bd0fe5743c604e1f12c49a6448c6eeb66737fdad3e6b424f4bec9159c5a4f782
-
SHA512
cfb045439122ebe503447462afb9ec4341445ba8e21f475f4a666bdfd2244bb9b9129527041cdb198381b2b528880a536010a3aed25aac9d340aed4effa498d5
-
SSDEEP
1536:OueXjVYyE/YqVWmQtu/NwRd86gbcgP2k7jEXm7ZwNm8QF6mYzSsKFgANXjaJA++e:Lt/fVWmQtu/NqUbcgP2k7gXm7ZwNm8QQ
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c095fa79b8fbd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008c66dacf3255794896cbcb5ac20a714000000000020000000000106600000001000020000000281b062bd20db4f9d8b3249b5929e6f5bc2dfd5b254910d71f9aac0835df26e5000000000e80000000020000200000004d7735d0f9055a63224293e3c9120f9c080033212efe15c248739b39269f02ba200000005f2c8f470ffb576148bf2905aa19c9ab642cac16a71ba564b1d6e6f1a02a916840000000fca15d456f25e0b5b1e65f884589bc9111e70ff0363bcef3df1ea7e8a3d40f20c268915f144ab3a7b541f070a85da88a9c4a9105c4a7b566c4839158a847402a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A24E40D1-67AB-11EE-9771-E6515181EC0E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "403131603" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2444 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2444 iexplore.exe 2444 iexplore.exe 1748 IEXPLORE.EXE 1748 IEXPLORE.EXE 1748 IEXPLORE.EXE 1748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2444 wrote to memory of 1748 2444 iexplore.exe 28 PID 2444 wrote to memory of 1748 2444 iexplore.exe 28 PID 2444 wrote to memory of 1748 2444 iexplore.exe 28 PID 2444 wrote to memory of 1748 2444 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\truegameplay.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2444 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54bbc212f322b492e764f6b304c69010a
SHA1528c601f0ce7ea3e913e0033f9d034c9e8f07574
SHA2564d5bc1123a6278ef5f6bd8129e6478a158c79fef97417c6fc978f7c5c6865053
SHA512f4310f8e0ada007e83a54792b6307f53a09b6aef3a9c282888688a109e0a18c2ca863e32118bbe6a615c59dd0979b6bcbeef26eeda2402fd866f1fb6349926b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d1430c2c7518911de8ee79792caf475
SHA1ebec2aba84179fb873b5575a17fecce867b1e317
SHA25644a7bc61a1399621fc2d0825a2225d485c431447580454f23dca3df56d76477a
SHA51257b7fb3a47aad171701cae75da35db2321ae24b7750178e790cac2f0aef6d4d82cfc861b5f02a8103b1e40dbe070001d315886d89cb1efd18c3bc82c74c2f083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51963754b76bdf458964acaba78b53323
SHA1c8c0a4b12991bc5c9d503ed8f87dc4b2705ba6ce
SHA25615cbbf6abdcefc6928886971686ac739e458dda1d4557160ad2dc3e479cc28dc
SHA512817fd7f2a71edb24cd72ca47f5fe12b044b3c1c6334b5663c2359a77c39cc21fe3766ce2772beb606d647f919bad2d3826887b0842a2ce65b3c92a039febd09d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524cd7dbae75f09eac2b07f9734181c39
SHA1f81286f4a5db43196197ecff182cfb7aac32a541
SHA2561c9745040204f761e72350aa5df0e438cf7203d6f43908de62f015ccc9f4631d
SHA5128aa9781e69d31d85563a0950604017764594c34c16eeac94938cd744480c4ad8418931eb40e7780c9a367166f77b662800e68e714a846508b642f92744fe2912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c260b750e6252f5de3ca920af20bbe5a
SHA17afa199b6e32ded8bdad06475d2a55c3aedf5cce
SHA25603fe870e4ade73b760d9d1aeb36de619039ec982238e8ae25d826abc9f87c1e5
SHA5126b70f2f45bdd34aa2fe005131dc286f9e38c9e7da691fbf32ee972b25c2c5bbf3e0ea83bbd2b0ca0be9552bbc9901f7bd0db472c2b8255ad2debd657fe6c2dd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53579341f4e73e771741dc57993c4fcff
SHA165cb931aa41c099decdcf0f9fdcb8f14b21a579d
SHA2567d1f86516e258126bb21e1d6444d76186ab9cdd69df71624924d4da51dd9ad66
SHA5129521cef60107c5ffc46e9e932430050fb7b23f545c8e1e671e4f6da713b6ffef88ae1ebf42486f10628d96a0097fec8b9ffde3ae01d8ef8a8d50a7a815bfeb6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca2cceee2fa98a6151af90dcaf28118d
SHA1ed6f0290a08ed1ee95519690171840c488bf2f6b
SHA256121f45085524ad9ab3426fd44690bb3d9a03d941599553fe73a7d6c00eb6b757
SHA5122131b1bee329ea6f2e9e613262bb24ec45bcdb64691317b01f29b3fd589da02d5c34a90a40f42d27c893eaf9ab9746d688d8794d04884f6d83cba7b2673282d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc6a28080f02befad9ce70439d06cab2
SHA113d715416fc5324dd8d27e3d3344886e7f8b3936
SHA2567016fd4ef17fc327275d1303d34d86ba4745dfd4cdcdfb6061ba0e3b9309264b
SHA5120397dd2a39410f6de713ff0c73cbc188122f01f90fbd6789cac0f8d06db7d22cce43713bf9a0ca18566d88d29d7b622ee979838584ca0b8d4a5e3ffd771e8896
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf