Analysis

  • max time kernel
    147s
  • max time network
    237s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2023 08:41

General

  • Target

    SINVR/www.newgamesbox.com/SINVR/SinVR.exe

  • Size

    21.7MB

  • MD5

    e011044eba976d726234b15f46123496

  • SHA1

    4d5429d6ed39eca5c4d4395eae56b8e55a1f46c0

  • SHA256

    14551d9009ba1b8664fb4b27a51047b97ca14334ed4e37688cf65c42d988d84f

  • SHA512

    febb2fa5037899d088dba35649536b46647a9399b1443c3a5ab98478783debcbde93d85e66ca8ff98611120bbc3a733f60cfa0d1a3974fbb4949c81690f3384b

  • SSDEEP

    393216:/nrUE385O1VDMasRBkTsKJNiOf6aBg8Z7rXipXHT2DrN:5CaPSC

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SINVR\www.newgamesbox.com\SINVR\SinVR.exe
    "C:\Users\Admin\AppData\Local\Temp\SINVR\www.newgamesbox.com\SINVR\SinVR.exe"
    1⤵
    • Checks processor information in registry
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1884
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x4e0 0x4d8
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\sinVR\sinVR\Unity\4f5b46b8-ffb0-49c2-b39c-d664fb164feb\Analytics\ArchivedEvents\169722207000004.27200fbf\s

    Filesize

    341B

    MD5

    eec6bf9cc43cbbc9b2baa88334b8bcc5

    SHA1

    fc0f15eb22e370830efffb3c50b600094c760149

    SHA256

    1dcaa22e369a1cfda56688ac03d1d727f80980062a82cad84946f5c5ef41db38

    SHA512

    206b981b6ba4754f6aae8f558d615e34a50ee8d63b033b3cce4e97c33bf4a807aa180bb38c385885cc4bb6e8aa10f0bde8799ae3ba85a75d779f05e66b1e806c

  • memory/1884-0-0x0000000005100000-0x0000000005200000-memory.dmp

    Filesize

    1024KB

  • memory/1884-1-0x0000000004B40000-0x0000000004C40000-memory.dmp

    Filesize

    1024KB

  • memory/1884-12-0x00000000132F0000-0x00000000133F0000-memory.dmp

    Filesize

    1024KB

  • memory/1884-55-0x0000000005100000-0x0000000005200000-memory.dmp

    Filesize

    1024KB

  • memory/1884-59-0x0000000004B40000-0x0000000004C40000-memory.dmp

    Filesize

    1024KB

  • memory/1884-60-0x00000000132F0000-0x00000000133F0000-memory.dmp

    Filesize

    1024KB