Analysis
-
max time kernel
0s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 19:42
Static task
static1
Behavioral task
behavioral1
Sample
0_Day_Trainer_Savegames_Patches.de.url
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0_Day_Trainer_Savegames_Patches.de.url
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
Dead Rising 2 v1.0 + 15 Trainer.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Dead Rising 2 v1.0 + 15 Trainer.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Download more trainers and updates.url
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Download more trainers and updates.url
Resource
win10v2004-20231222-en
General
-
Target
0_Day_Trainer_Savegames_Patches.de.url
-
Size
184B
-
MD5
3ac5958df4f92691f0abf2d665916c28
-
SHA1
6b2a41d18dc26096d0ff6f87b3c73f86b3e3dd07
-
SHA256
0f0d83c5fbcf1b4e5e0bc51c7e22da25cea1ce686d82697794190099e419e44c
-
SHA512
1d6fe688c4c103e6e1be4e98ddd21b1bc448e1fedcc4b57c996a62739e02451e4bb8a250766f98a5d161aee9fa8218b1cbd960352ed76d7c269ca9cf9ce87924
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{74A453A1-AB39-11EE-BE92-46FC6C3D459E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2880 iexplore.exe 2880 iexplore.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2816 2880 iexplore.exe 18 PID 2880 wrote to memory of 2816 2880 iexplore.exe 18 PID 2880 wrote to memory of 2816 2880 iexplore.exe 18 PID 2880 wrote to memory of 2816 2880 iexplore.exe 18
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\0_Day_Trainer_Savegames_Patches.de.url1⤵
- Checks whether UAC is enabled
PID:1476
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2880 CREDAT:275457 /prefetch:22⤵PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD51f1a3b101012e27df35286ed1cf74aa6
SHA146f36d1c9715589e45558bd53b721e8f7f52a888
SHA2567f0b1fe38c7502bea9c056e7a462ab9f507dd9124f84b1d4666fb7d37cf1b83c
SHA512d6f6787de85049d884bf8906292b0df134287cc548f9f3fadd60d44545652d55c296ed50e72687f776f0bf6b131102b4bf9b33143998cb897f21427fbc8306a3
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5f1dc8cabc887156cb5e8af0c1f6db7e7
SHA107a07a189540406f9d35385e11116bb18bd99098
SHA256cc37bd6d645257b68c6e64aa9aa22d9f3e7fee99746926c8e165add13d1f11b8
SHA51213b6cb67a89f086a972f3a3ab9440ba7c823b500e5f5b04dfe40fd206817afe18889062a1201e2e1501d5eb0075362b8eeef32d5d4fcf54e634badff6232ca53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567ee1f0a9d615d60fbad9c6622f099e0
SHA1130595e44daff8a07f365e1fcfce46bfc66e9541
SHA256c47fdc84289a077f9cc7f3cd42df162f77ddff134269f405835de6b5a7824d2c
SHA5124daba6be79c64197987166d537f353466792b9ccb63cd5df552b90abda86d791faaf29379e6ab8ed0b4897e82fa75fa0d66fa965913ab6979c16c2a573d60551
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD50364824c56e29ba2cacc1d0463d1b1be
SHA1ade500886743e11d609e51c6c0ea9080d0495e3a
SHA25680cb7a193e3c6774a6d84e156442b4917ff95c0832f28f19ca36ca320c88984f
SHA512466bdd583b39bc74fbc3e8221d2d1c22fd0e39fded528abb6c2bb0e62561b50c73f2e23539cb0633ec779f923a20969e91dc42dca397365d06f8f6e08f27160f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
101KB
MD56e52fc40b123abef2f556c87b8044178
SHA1ad1279314264a7db1cb57a33b9ed81dc0dfe21f4
SHA2568e4fa9e2e1e7f54c16ebcf8910fc5260ef71c6cd5abbf58d27e9a8bd37474a70
SHA512c2c735240e89404614d2abaf6b3664d59d334d307dce29f7df9c9cb1069713fe62b0e73532c098572516e742ffdc7890668f319dd86cb5b807c6a891f64793f2