Analysis

  • max time kernel
    159s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26-02-2024 12:31

General

  • Target

    LDPlayer9_ens_66468437_ld.exe

  • Size

    3.3MB

  • MD5

    7c2e5ef59e9589422bcd5bf3726fbcb1

  • SHA1

    c4dac6966ac4cd3500d6a7fe44138a0db639d507

  • SHA256

    6870e8dbcfaf543500add1d303de528c34e3b1f4d4424b0097c4ffb408a44fcd

  • SHA512

    28870d9cb07f964ba0ecedfb25762cb4530bda869cc717dd4fffcd176085f03c05fd129b23e826dd6ac33ae6af8132bf9dc317ebffb52448b83236ad2349ca45

  • SSDEEP

    49152:XZi5hu7I/BzfK/ZHg1pHtOUYqP3CFOrtG/RR9sXafgkDFMVR9C1UhPJXMK701hOw:XI5ht/BzfKW1t0xOouBiCV2Ht

Score
6/10

Malware Config

Signatures

  • Checks for any installed AV software in registry 1 TTPs 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Loads dropped DLL 3 IoCs
  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 12 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LDPlayer9_ens_66468437_ld.exe
    "C:\Users\Admin\AppData\Local\Temp\LDPlayer9_ens_66468437_ld.exe"
    1⤵
    • Checks for any installed AV software in registry
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1136
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1136 -s 2384
      2⤵
      • Program crash
      PID:1080
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:1776
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      1⤵
        PID:1232
      • C:\Program Files\VideoLAN\VLC\vlc.exe
        "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\RestartSuspend.mpeg"
        1⤵
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:2284

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Defense Evasion

      Subvert Trust Controls

      1
      T1553

      Install Root Certificate

      1
      T1553.004

      Modify Registry

      1
      T1112

      Discovery

      Software Discovery

      1
      T1518

      Security Software Discovery

      1
      T1518.001

      Query Registry

      1
      T1012

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        c33d82ff1aeedabaab6a73f42ca9f00f

        SHA1

        5954bbf52ac2858f15e94baec3e816fbf96f487c

        SHA256

        7cf01812000cba713d093f8ec3855f3a8b7a38446fa9ac68ca4f6c163ea7ca44

        SHA512

        6557636d5315ddc847253c53a44f71e6802d3aa886b3839cf6f49c33a1d378d674f3dd183f345ca97d83687baae0485e6697ecfeb4b4f1a020b71cf388118482

      • C:\Users\Admin\AppData\Local\Temp\Cab9EB1.tmp
        Filesize

        65KB

        MD5

        ac05d27423a85adc1622c714f2cb6184

        SHA1

        b0fe2b1abddb97837ea0195be70ab2ff14d43198

        SHA256

        c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

        SHA512

        6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

      • C:\Users\Admin\AppData\Local\Temp\Tar9F12.tmp
        Filesize

        171KB

        MD5

        9c0c641c06238516f27941aa1166d427

        SHA1

        64cd549fb8cf014fcd9312aa7a5b023847b6c977

        SHA256

        4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

        SHA512

        936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

      • \Users\Admin\AppData\Local\Temp\Setup\ds.dll
        Filesize

        67KB

        MD5

        7d5d3e2fcfa5ff53f5ae075ed4327b18

        SHA1

        3905104d8f7ba88b3b34f4997f3948b3183953f6

        SHA256

        e1fb95609f2757ce74cb531a5cf59674e411ea0a262b758371d7236c191910c4

        SHA512

        e67683331bb32ea4b2c38405be7f516db6935f883a1e4ae02a1700f5f36462c31b593e07c6fe06d8c0cb1c20c9f40a507c9eae245667c89f989e32765a89f589

      • memory/1136-130-0x00000000740E0000-0x00000000747CE000-memory.dmp
        Filesize

        6.9MB

      • memory/1136-131-0x00000000039E0000-0x0000000003A20000-memory.dmp
        Filesize

        256KB

      • memory/1136-15-0x0000000002900000-0x0000000002914000-memory.dmp
        Filesize

        80KB

      • memory/1136-16-0x00000000740E0000-0x00000000747CE000-memory.dmp
        Filesize

        6.9MB

      • memory/1136-128-0x0000000003580000-0x00000000035C4000-memory.dmp
        Filesize

        272KB

      • memory/1136-129-0x00000000039E0000-0x0000000003A20000-memory.dmp
        Filesize

        256KB

      • memory/1136-11-0x00000000039E0000-0x0000000003A20000-memory.dmp
        Filesize

        256KB

      • memory/1136-17-0x00000000748A0000-0x00000000748B4000-memory.dmp
        Filesize

        80KB

      • memory/1136-132-0x00000000039E0000-0x0000000003A20000-memory.dmp
        Filesize

        256KB

      • memory/1136-133-0x00000000039E0000-0x0000000003A20000-memory.dmp
        Filesize

        256KB

      • memory/1136-134-0x00000000740E0000-0x00000000747CE000-memory.dmp
        Filesize

        6.9MB

      • memory/2284-152-0x000000013F020000-0x000000013F118000-memory.dmp
        Filesize

        992KB

      • memory/2284-153-0x000007FEF4880000-0x000007FEF48B4000-memory.dmp
        Filesize

        208KB

      • memory/2284-154-0x000007FEF45C0000-0x000007FEF4874000-memory.dmp
        Filesize

        2.7MB

      • memory/2284-155-0x000007FEF30D0000-0x000007FEF417B000-memory.dmp
        Filesize

        16.7MB

      • memory/2284-156-0x000007FEF24C0000-0x000007FEF25D2000-memory.dmp
        Filesize

        1.1MB