Analysis
-
max time kernel
0s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 00:01
Static task
static1
Behavioral task
behavioral1
Sample
20eb6b8655de71aad0ba6e71a045b1f6.exe
Resource
win7-20231129-en
General
-
Target
20eb6b8655de71aad0ba6e71a045b1f6.exe
-
Size
2.6MB
-
MD5
20eb6b8655de71aad0ba6e71a045b1f6
-
SHA1
1770246098ea07e2024dd31de0fba54916d7236b
-
SHA256
685933af075d310ddb454b399641cfdbf801441e5360df0e71204d63d2afc757
-
SHA512
bb6a8f071ca9d77ab6c10f90b3ba1ad1e86c7b326fa7731c13fde95554bba97cf374878a64a7ad4fec0aee3301751ab32d280a8c440aa78319fc89f5391f2259
-
SSDEEP
49152:pAI+mPQQSU9afXEDN50Qx8lMmD4gGovWhJLEx2BwDPw1V46hi5SC0DNdSM2SwMpt:pAI+M4UsuNxyvGoOnEx2BoQVlhi5S9OG
Malware Config
Extracted
vidar
39.9
916
https://prophefliloc.tumblr.com/
-
profile_id
916
Extracted
ffdroider
http://186.2.171.3
Signatures
-
FFDroider payload 2 IoCs
resource yara_rule behavioral1/memory/2588-70-0x0000000000400000-0x000000000067D000-memory.dmp family_ffdroider behavioral1/memory/2588-186-0x0000000000400000-0x000000000067D000-memory.dmp family_ffdroider -
Vidar Stealer 4 IoCs
resource yara_rule behavioral1/memory/2504-143-0x0000000000220000-0x00000000002BD000-memory.dmp family_vidar behavioral1/memory/2504-144-0x0000000000400000-0x0000000002CBF000-memory.dmp family_vidar behavioral1/memory/2504-195-0x0000000000400000-0x0000000002CBF000-memory.dmp family_vidar behavioral1/memory/2504-203-0x0000000000220000-0x00000000002BD000-memory.dmp family_vidar -
Executes dropped EXE 4 IoCs
pid Process 2664 GameBox32Bit.exe 2756 BotCheck.exe 2504 GameBox64bit.exe 2632 GameBox.exe -
Loads dropped DLL 6 IoCs
pid Process 1936 20eb6b8655de71aad0ba6e71a045b1f6.exe 1936 20eb6b8655de71aad0ba6e71a045b1f6.exe 1936 20eb6b8655de71aad0ba6e71a045b1f6.exe 1936 20eb6b8655de71aad0ba6e71a045b1f6.exe 1936 20eb6b8655de71aad0ba6e71a045b1f6.exe 1936 20eb6b8655de71aad0ba6e71a045b1f6.exe -
Unexpected DNS network traffic destination 4 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 185.116.193.219 Destination IP 185.116.193.219 Destination IP 185.116.193.219 Destination IP 185.116.193.219 -
resource yara_rule behavioral1/memory/2588-70-0x0000000000400000-0x000000000067D000-memory.dmp vmprotect behavioral1/memory/2588-186-0x0000000000400000-0x000000000067D000-memory.dmp vmprotect -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 8 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\note8876.exe 20eb6b8655de71aad0ba6e71a045b1f6.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin32.exe 20eb6b8655de71aad0ba6e71a045b1f6.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\Uninstall.exe 20eb6b8655de71aad0ba6e71a045b1f6.exe File created C:\Program Files (x86)\GameBox INC\GameBox\Uninstall.ini 20eb6b8655de71aad0ba6e71a045b1f6.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\GameBox32Bit.exe 20eb6b8655de71aad0ba6e71a045b1f6.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\BotCheck.exe 20eb6b8655de71aad0ba6e71a045b1f6.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\GameBox64bit.exe 20eb6b8655de71aad0ba6e71a045b1f6.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\GameBox.exe 20eb6b8655de71aad0ba6e71a045b1f6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2916 2588 WerFault.exe 2768 2504 WerFault.exe 32 -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2664 1936 20eb6b8655de71aad0ba6e71a045b1f6.exe 34 PID 1936 wrote to memory of 2664 1936 20eb6b8655de71aad0ba6e71a045b1f6.exe 34 PID 1936 wrote to memory of 2664 1936 20eb6b8655de71aad0ba6e71a045b1f6.exe 34 PID 1936 wrote to memory of 2664 1936 20eb6b8655de71aad0ba6e71a045b1f6.exe 34 PID 1936 wrote to memory of 2756 1936 20eb6b8655de71aad0ba6e71a045b1f6.exe 18 PID 1936 wrote to memory of 2756 1936 20eb6b8655de71aad0ba6e71a045b1f6.exe 18 PID 1936 wrote to memory of 2756 1936 20eb6b8655de71aad0ba6e71a045b1f6.exe 18 PID 1936 wrote to memory of 2756 1936 20eb6b8655de71aad0ba6e71a045b1f6.exe 18 PID 1936 wrote to memory of 2504 1936 20eb6b8655de71aad0ba6e71a045b1f6.exe 32 PID 1936 wrote to memory of 2504 1936 20eb6b8655de71aad0ba6e71a045b1f6.exe 32 PID 1936 wrote to memory of 2504 1936 20eb6b8655de71aad0ba6e71a045b1f6.exe 32 PID 1936 wrote to memory of 2504 1936 20eb6b8655de71aad0ba6e71a045b1f6.exe 32 PID 1936 wrote to memory of 2632 1936 20eb6b8655de71aad0ba6e71a045b1f6.exe 31 PID 1936 wrote to memory of 2632 1936 20eb6b8655de71aad0ba6e71a045b1f6.exe 31 PID 1936 wrote to memory of 2632 1936 20eb6b8655de71aad0ba6e71a045b1f6.exe 31 PID 1936 wrote to memory of 2632 1936 20eb6b8655de71aad0ba6e71a045b1f6.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\20eb6b8655de71aad0ba6e71a045b1f6.exe"C:\Users\Admin\AppData\Local\Temp\20eb6b8655de71aad0ba6e71a045b1f6.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files (x86)\GameBox INC\GameBox\BotCheck.exe"C:\Program Files (x86)\GameBox INC\GameBox\BotCheck.exe"2⤵
- Executes dropped EXE
PID:2756 -
C:\Program Files (x86)\GameBox INC\GameBox\BotCheck.exe"C:\Program Files (x86)\GameBox INC\GameBox\BotCheck.exe" -a3⤵PID:2532
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin32.exe"C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin32.exe"2⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\is-L6M7G.tmp\GameBoxWin32.tmp"C:\Users\Admin\AppData\Local\Temp\is-L6M7G.tmp\GameBoxWin32.tmp" /SL5="$70120,506127,422400,C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin32.exe"3⤵PID:2708
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\note8876.exe"C:\Program Files (x86)\GameBox INC\GameBox\note8876.exe"2⤵PID:2588
-
-
C:\Program Files (x86)\GameBox INC\GameBox\GameBox.exe"C:\Program Files (x86)\GameBox INC\GameBox\GameBox.exe"2⤵
- Executes dropped EXE
PID:2632
-
-
C:\Program Files (x86)\GameBox INC\GameBox\GameBox64bit.exe"C:\Program Files (x86)\GameBox INC\GameBox\GameBox64bit.exe"2⤵
- Executes dropped EXE
PID:2504 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2504 -s 8843⤵
- Program crash
PID:2768
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\GameBox32Bit.exe"C:\Program Files (x86)\GameBox INC\GameBox\GameBox32Bit.exe"2⤵
- Executes dropped EXE
PID:2664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 1841⤵
- Program crash
PID:2916
-
C:\Windows\system32\rUNdlL32.eXerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵PID:2332
-
C:\Windows\SysWOW64\rundll32.exerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main2⤵PID:2564
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:1696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD595a0ac2189b3e6aa4b9383d99f5da110
SHA1b302a47d4fd0f2dd8e4536e76ece2b5fed02006e
SHA256990fd1487190b791f403b1d7feafb5fcf547a2abe952fce676ef2b3fff8dab14
SHA5121005a4882b7dcd74f9270f721d4f995997abcc4290c077c738f17bb94a766c671a8f933c5bf5a8a26ca019c41c3f6f9b1a7c923c04e86e34b2a7cd30cc47de42
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5587e3f0651e565391196cb0ccb23d1db
SHA1c1770359ce561ad81eab414db77fc70a0dc2f7ff
SHA25663205ff5e8b241feae6241d030b474c9b74808d22e7c65fcd9f843ca73fafc2f
SHA5127aae5cdbbf09790bf233fd041569b134a3bfc01f1046d7cf5efe576f1c3ec0f88c3a44535e7adbef4a2912e3b74a9f82a880fcebb5b19296fa9d8d3480b9c1f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593364c7c191647eaf452af99cc439085
SHA18b0a25f6c0879ccdd3310976fd01bd07ba134804
SHA256d0d272d70d6bab563b91e0db8b3de9af764a2793bceb3128229b53a645bca161
SHA5126ae2597766ed70fe4f534e2d1302be9eeec2b875e420ceb2fa8ca40dc4d3e4480a9965e69e4a93af89483640f207102e92d6aa3d197be7cef76382fca8ec415e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD50658e9aad98aa8efe7437744c2cf380d
SHA16598fc2829e9e32f6d386e2eba082f5bb99d3836
SHA256d83bdf96b97abb6f2325df7be500160d1513997a00ad904a552598378601f022
SHA512c42abbc2fe2db50fdcd17899aefd16309547e720390fd80d9bdb82694cd21a476f6e02e1d251453ad5100f557fa118ea663c066846216f5fca935e406f5c5a0a
-
Filesize
540KB
MD5428821691d16f489bcbb6054e590f931
SHA167782087763116ec1161b0b101e846aaf7ad6938
SHA256f24ff2523af577fd2bda2d2c2fc82912515e49ec7ed7438a4a2aa5f17596fb24
SHA51288e7c2ea00710303a36c6fcaf7ca922931632d80c93bb3c69ba262bb95ec7894b01a86467da008a099b102439dbb7d088c05c75eac8ede8d49d081788b3b2048