Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 21:23
Static task
static1
Behavioral task
behavioral1
Sample
41f0f5265cc1ca105c5addef3e51da02.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
41f0f5265cc1ca105c5addef3e51da02.exe
Resource
win10v2004-20231215-en
General
-
Target
41f0f5265cc1ca105c5addef3e51da02.exe
-
Size
408KB
-
MD5
41f0f5265cc1ca105c5addef3e51da02
-
SHA1
3f698bda90e5007f97fa00a148ab8d341c9b4752
-
SHA256
5eb78224790eaafcb32bacbb09c9f90b2f3e924e422903967e7c5a172fc1690c
-
SHA512
ad316ab119a9650d78bf6dd4c7def93b5b0bd28f547781dca00e5edc89d712f2e30275aa5d502a72ac39011bb31a221b69d28f0cb5dad3cbe69e18432f9f0e47
-
SSDEEP
12288:sutrzh9xOXktnCeUs/cVGB8JZa+zXuTdfYbKc:sutr5OUea+C2bT
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0008000000015dbb-20.dat acprotect behavioral1/memory/1528-49-0x0000000000870000-0x0000000000879000-memory.dmp acprotect behavioral1/memory/1528-51-0x0000000000580000-0x0000000000589000-memory.dmp acprotect -
Executes dropped EXE 1 IoCs
pid Process 1528 GamePlayLabsInstaller.exe -
Loads dropped DLL 8 IoCs
pid Process 1588 41f0f5265cc1ca105c5addef3e51da02.exe 1528 GamePlayLabsInstaller.exe 1528 GamePlayLabsInstaller.exe 1528 GamePlayLabsInstaller.exe 1528 GamePlayLabsInstaller.exe 1528 GamePlayLabsInstaller.exe 1528 GamePlayLabsInstaller.exe 1528 GamePlayLabsInstaller.exe -
resource yara_rule behavioral1/files/0x0008000000015dbb-20.dat upx behavioral1/memory/1528-49-0x0000000000870000-0x0000000000879000-memory.dmp upx behavioral1/memory/1528-51-0x0000000000580000-0x0000000000589000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x002600000001529f-5.dat nsis_installer_1 behavioral1/files/0x002600000001529f-5.dat nsis_installer_2 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1528 GamePlayLabsInstaller.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1588 wrote to memory of 1528 1588 41f0f5265cc1ca105c5addef3e51da02.exe 28 PID 1588 wrote to memory of 1528 1588 41f0f5265cc1ca105c5addef3e51da02.exe 28 PID 1588 wrote to memory of 1528 1588 41f0f5265cc1ca105c5addef3e51da02.exe 28 PID 1588 wrote to memory of 1528 1588 41f0f5265cc1ca105c5addef3e51da02.exe 28 PID 1588 wrote to memory of 1528 1588 41f0f5265cc1ca105c5addef3e51da02.exe 28 PID 1588 wrote to memory of 1528 1588 41f0f5265cc1ca105c5addef3e51da02.exe 28 PID 1588 wrote to memory of 1528 1588 41f0f5265cc1ca105c5addef3e51da02.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\41f0f5265cc1ca105c5addef3e51da02.exe"C:\Users\Admin\AppData\Local\Temp\41f0f5265cc1ca105c5addef3e51da02.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\GamePlayLabsInstaller.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\GamePlayLabsInstaller.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:1528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
131B
MD5c49a5c472a1611f65f66f79b5559d9eb
SHA1fbf423986490944a0eb43414f3f067a815cbea4f
SHA256f04ace532c03350c4ae7a9cc72df4523ab02726262871b05963508e7a8d976c2
SHA512b5d167e5fcc7cf3febad4d0447b532ae5c82c34785575de3a19fa87f0c503311628924512da205c4c4d0dcd58968f7e57f466176cecc6c0766ad9a9ba763eb29
-
Filesize
214KB
MD5b2677ec349f992cb2ecc859d450ec471
SHA162498e000a3242d08643d6b2845c851500c5ef91
SHA25661bc694f692913ef11fbee0f17d9c8494ff0bdbb484379c3c823898a57f3bd7b
SHA51201ce08de0fa0b029dc61250b3e7498e89dd1511ced999956167f82842fbadc18b465b7da8d8e7f320419aa8221ae74c11a8faa89f84d77f0c46df5eeb6c4f63c
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
13KB
MD529858669d7da388d1e62b4fd5337af12
SHA1756b94898429a9025a04ae227f060952f1149a5f
SHA256c24c005daa7f5578c4372b38d1be6be5e27ef3ba2cdb9b67fee15cac406eba62
SHA5126f4d538f2fe0681f357bab73f633943c539ddc1451efa1d1bb76d70bb47aa68a05849e36ae405cc4664598a8194227fa7053de6dbce7d6c52a20301293b3c85f
-
Filesize
20KB
MD509a8214787e02694a0c6c815c5867e39
SHA133208d636c19c4a781c85d4b2a0644138202696e
SHA2566c96098405c480ae8901fe779e4515f5bac45fab5201e03c1b039b09d5fc2d33
SHA51204fee33a364710933ae948b29e1a455ed0feff6fcdda113a67735d39d0603bcbba9a6136ac0ef3c6988812a8d6d63cd0badaa491d80b0eb6464acba53cd76d25
-
Filesize
6KB
MD50745ff646f5af1f1cdd784c06f40fce9
SHA1bf7eba06020d7154ce4e35f696bec6e6c966287f
SHA256fbed2f1160469f42ce97c33ad558201b2b43e3020257f9b2259e3ce295317a70
SHA5128d31627c719e788b5d0f5f34d4cb175989eaa35aa3335c98f2ba7902c8ae01b23de3ccb9c6eb95945f0b08ef74d456f9f22ca7539df303e1df3f6a7e67b358da
-
Filesize
12KB
MD5aaf5a62051c11db6aa1a651bb9c295dd
SHA175413fd14a67a468578c9d8fbd1c0a810c5044d0
SHA25655ec0f7d4c14b8b36e18203dad5604d066979e18017207f1165f17691845b161
SHA512f35a6c4e133d5dd396cc326f7f7365483de0477629e290a91b2200253cf7bb39e0d8ab700eda66d88c7b5568cfac069d4a7b277400ad776d64611a3723362466