Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 11:50
Behavioral task
behavioral1
Sample
2023年全部热门单机游戏及汉化下载.url
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2023年全部热门单机游戏及汉化下载.url
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Icarus v1.1.0-v2.0.0 Plus 27 Trainer.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Icarus v1.1.0-v2.0.0 Plus 27 Trainer.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
www.3dmgame.com.url
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
www.3dmgame.com.url
Resource
win10v2004-20231215-en
General
-
Target
www.3dmgame.com.url
-
Size
122B
-
MD5
49cbfed4fa9b3fafdc9d499b6163fa62
-
SHA1
28decd9138bd3f7b3ef38bf9e40cd0d6305d1cdb
-
SHA256
03df27e82600098c34c413cc2e45b43638d3ac33666960cfbd913f1c3f9a0b11
-
SHA512
64e91ed564ef64d7687599012c4728b811fec2661dcb7941374cdd3a8450563073c67c452d97d43545f49182fbda2c26702dd35088723ace21717282d1233627
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9F7C2F71-A252-11EE-A7E3-F2B23B8A8DD7} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409580493" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa00000000020000000000106600000001000020000000988e550abade6e5d70550e400a0520488d74a4594e81be2037548365a7ed5d3f000000000e800000000200002000000048fb2046794666810c0e28238708478382121aab2f74547c1d37e45530f28ef8200000005a9ebeec8f17c3029b7a1a48b22aefb39ca192b74b7c907c01167d7f7472dbe640000000f79ab0f69ebecfcf808864a4d57a2d7b8be26836e329db498334cf3c1587fb53400a9239d421d995794bbc06ac0548a0d37a0ce9463256015f1cc2cf61e054a1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 600e6fa65f36da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1960 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1960 iexplore.exe 1960 iexplore.exe 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2740 1960 iexplore.exe 29 PID 1960 wrote to memory of 2740 1960 iexplore.exe 29 PID 1960 wrote to memory of 2740 1960 iexplore.exe 29 PID 1960 wrote to memory of 2740 1960 iexplore.exe 29
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\www.3dmgame.com.url1⤵
- Checks whether UAC is enabled
PID:1628
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1960 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524884210499266720fe766a5d16c9212
SHA1cb92746b7e877eeef68b491aa434c955af3923b3
SHA2560e65876b8e86d2cb71abb01663744664afcaa89af1ba93385cc5be6705f13d5c
SHA512aafdd9aa96e794b723fd2a003f8d74f48b382d0b82149b8adab459c79b28671d964b043c4ced772e7f8873cae73ea9a9ac3da86bd559fb7c739672806737e2b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb62af8eeded486f0a4365d1ed7ef8e8
SHA1e7a47a37e60dc1dcb52fb5af11bd8c7a960a1272
SHA2563e4b864ed10423bb4d62f9972610ed35e5fe4ab9c99456e5c1e15fbea01b182a
SHA512818f9d04926ba936d1a7215973d9d496f6077ebe0719e35d7b3a8a6d1ebd33d4653d26c9c9c0890c42465d24483ee1a3326173f59457d25f50c7ac9c755aa931
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a36fbdbc60b309bbbfe37a3886ee9120
SHA13cff8a19b59865f5645b7f7b346b7adc0efe6bc0
SHA256eb16f3d9b5441b8745b89a4a0e2a74aec4a52fa2cb6087cf5a099a673e33407b
SHA5129d6f7039147529a7eb0323824867a8491fe1ad86e656939e8172d69d1144213b4931d0c1d99311c19108ff01df61b6feb632a247ac02c446ccbfcf1d1714e3d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef1e2e84828d51ec711882b2444e46d8
SHA16fc13a6814ab9e8a9ae814e021974b2d3c9827b6
SHA25623cae890e0b2e196a207b9159747e146a2fc15e9ba275248bd9fff5df3f3b07e
SHA512d9101262c0cb2340adaef088228421c3f2efebc022e20cf5292f2e5d6f26874d8652fccbf0c68254dc48ac26fec5871478d4eb7bc369486d98677d889e17c2a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50731e4c317cd7ed0055800dc80f007bb
SHA176e2d33b7c4654a35ca8ac06be967db2f15f6585
SHA2560a5b036504efb527737d622462370238495ab3176b412e4956233bbf223e5625
SHA512ac1dfe0b30efe48173a0b211047aa6af8c73357183a370c10a55f42206100269858bb5f7c8cc84942b76bd0c8d5631a60dfb9ff49ecc0b029d8cf269724c7911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c460249f1624a21d8dc6beaf4f331c19
SHA1d63bb3f9633f381a562c2392023bf8069a5747e2
SHA256b9a3000ebdc9afc1e35467d67c3360ef948d1c199fb2b582a22ae581b73b6ef2
SHA512bbe8ffdb616c6872951305f51babe1a5cd6fbb0feef3e590f0c11054d308abae61d15c586530737c4c5959db39b718f6d1fbaeabeda6cbc138272c13dea0222d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50490d490afb5fe3ff33bd49d44c66e55
SHA18588622a5e20a1a9bf51c6bf3de7653e63eb078d
SHA25658e473cde38d73de898854f2b3e6db323cf7a516b75539ef55d6a2437a442005
SHA5127eae57e7ca10d030ed479a8e4e5b8a3e7af0086bf61b090d59be44b3892e9b1464d6919789dff0051b49e2d2ddff99f2ed0fa8ffcba6ec2075ae59bb8088c448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec76e442110bf3f90f38df57cf47b641
SHA11e3d3d53a306b6dbd39f63d0fc2df6a2ec965a2d
SHA2563097b6a3f9f43e5b23c41d7d0da7565ea9b2cb4bd50b429b8df75c927a5af6bd
SHA51235f2cbea652fbef1d35e04aa77de2eaec8251df7338eca4a62cb90ccb53ad8b2dcd6cb3fa4eda5b86f46a35777b69c9c47a6a097a7b52ea4b09d0ad59a169eb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551fb01456e72048b22102808cc4f177c
SHA1c9ca1690c52a55a5b8b513c6bd34ad48f7517dc9
SHA256aa1569b5c2078b517e64d2363c7391f3be9bed443752e949429e760a143af474
SHA512bd29a7ae3ed86e9f5a07211fc8a0740bda4333bf2b3639a6a8b28adcfd81b753712b82aa6ebbb923aef2baddb9221b4c0bbf627b12a9800c9c50a67e92e90e89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9a507db0303bf146c834906fd86940d
SHA1357a036ba4232c7b3a09c2bf41c5e1c259e4d759
SHA256f30bb04a7ae5d65bf9e66c2fdb2588b28e7ed73b79e75227d33d6ed67b5e7133
SHA5121bff8c20f92e636fc2f22055751108710d66ad2b364bfd01ec7c670ae4f555c0130eb0715e8c4a1717b08e5134ece7d7a1456edf1f0fd034df9cf540b0b39364
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5004dd39236e2df4d6b6c0b16472970
SHA18cd875a60681c80cbb97e232edd039b84f500185
SHA25686e299fe629895880a88d428e6d0464330ce103a1f93893fbab0c2043c0ad377
SHA51276de40c17231414a7c37b7d6075e43baafaa4a9906ec31efdd8a37b8427227a34f72cab3441c64a7a3cae2a3c36e4e14db50ee165440e3b3b45eb1da16fe95e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac4b2491d2e53994b4ddbe01aae6294d
SHA16c87ded52f7b74b83dd274fdc49853e194080c5e
SHA256a0bd7293b06388bc06b83e53c42ba647b6b6cf9ad24b99cca1388e7388cd5540
SHA51276c578c6a754ef39c9f416fe31b5b40e8c7788d819af7f90024f93ae5b7ac967829b5283756d0a0b022f2e5791fed473268754d72f6aa86a203f8c6e76911ae3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56381fd8f44bdb0ebcf2ae1ade00b8f04
SHA1100e4d289a2869197683129de2701f1b53e05c02
SHA2569878ae582fc5c1608fd0f85ed8dca5e55043ada3fb5ad26470506a32ebb1e2e7
SHA51294daad841beb7b310eecac62c6555674ecbfad6c85acaedae801bfcce75f4f337f7b5542283130d802c1ac2cf15e53d17be88bef8beba756402c2fd36791678e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06