Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 01:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ZynGa Poker Chips Adder v2.1.3.exe
Resource
win7-20231215-en
windows7-x64
6 signatures
150 seconds
General
-
Target
ZynGa Poker Chips Adder v2.1.3.exe
-
Size
80KB
-
MD5
0fe12ef491b24ed853bb0335f97e10ba
-
SHA1
78f0f186dec52650685d04895005ac95d935a0ae
-
SHA256
7fc1ebb72a0f486afb24bbabcc28ecedbe0a9b1859e795da0fd7675aedf1104a
-
SHA512
eef51fc9d374d0c4459c704a6280c8d61c35e2746c2bd4979951fe9bebf91531104032521d5dc7f19ce83e65f7d459521870d342ac08af564904152837371ec3
-
SSDEEP
1536:raHLtZf6yIF/JuSkZWeGkqbT3ckFqtLUNCdL2rTTifY8JZ5TZU/1N:raHz6D/JBOQksAkItZL23+bJ3ZS
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1704 set thread context of 2296 1704 ZynGa Poker Chips Adder v2.1.3.exe 28 -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\URL = "http://www.google.com/cse?cx=partner-pub-9588033570232632:rhmyra-cwbb&q={searchTerms}" ZynGa Poker Chips Adder v2.1.3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\DisplayName = "Google" ZynGa Poker Chips Adder v2.1.3.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main ZynGa Poker Chips Adder v2.1.3.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes ZynGa Poker Chips Adder v2.1.3.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadUpdates = "398336" ZynGa Poker Chips Adder v2.1.3.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} ZynGa Poker Chips Adder v2.1.3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\SuggestionsURLFallback = "http://www.google.com/cse?cx=partner-pub-9588033570232632:rhmyra-cwbb&q={searchTerms}" ZynGa Poker Chips Adder v2.1.3.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "file://localhost/C:/www.google.com.htm" ZynGa Poker Chips Adder v2.1.3.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2296 ZynGa Poker Chips Adder v2.1.3.exe 2296 ZynGa Poker Chips Adder v2.1.3.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2296 1704 ZynGa Poker Chips Adder v2.1.3.exe 28 PID 1704 wrote to memory of 2296 1704 ZynGa Poker Chips Adder v2.1.3.exe 28 PID 1704 wrote to memory of 2296 1704 ZynGa Poker Chips Adder v2.1.3.exe 28 PID 1704 wrote to memory of 2296 1704 ZynGa Poker Chips Adder v2.1.3.exe 28 PID 1704 wrote to memory of 2296 1704 ZynGa Poker Chips Adder v2.1.3.exe 28 PID 1704 wrote to memory of 2296 1704 ZynGa Poker Chips Adder v2.1.3.exe 28 PID 1704 wrote to memory of 2296 1704 ZynGa Poker Chips Adder v2.1.3.exe 28 PID 2296 wrote to memory of 1240 2296 ZynGa Poker Chips Adder v2.1.3.exe 7 PID 2296 wrote to memory of 1240 2296 ZynGa Poker Chips Adder v2.1.3.exe 7 PID 2296 wrote to memory of 1240 2296 ZynGa Poker Chips Adder v2.1.3.exe 7 PID 2296 wrote to memory of 1240 2296 ZynGa Poker Chips Adder v2.1.3.exe 7
Processes
-
C:\Users\Admin\AppData\Local\Temp\ZynGa Poker Chips Adder v2.1.3.exe"C:\Users\Admin\AppData\Local\Temp\ZynGa Poker Chips Adder v2.1.3.exe"1⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\ZynGa Poker Chips Adder v2.1.3.exe"C:\Users\Admin\AppData\Local\Temp\ZynGa Poker Chips Adder v2.1.3.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2296
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1240