Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-03-2024 22:01
Behavioral task
behavioral1
Sample
2022年全部热门单机游戏及汉化下载.url
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2022年全部热门单机游戏及汉化下载.url
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Warm Snow v1.0-v20221104 Plus 12 Trainer.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Warm Snow v1.0-v20221104 Plus 12 Trainer.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
www.3dmgame.com.url
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
www.3dmgame.com.url
Resource
win10v2004-20240226-en
General
-
Target
www.3dmgame.com.url
-
Size
122B
-
MD5
49cbfed4fa9b3fafdc9d499b6163fa62
-
SHA1
28decd9138bd3f7b3ef38bf9e40cd0d6305d1cdb
-
SHA256
03df27e82600098c34c413cc2e45b43638d3ac33666960cfbd913f1c3f9a0b11
-
SHA512
64e91ed564ef64d7687599012c4728b811fec2661dcb7941374cdd3a8450563073c67c452d97d43545f49182fbda2c26702dd35088723ace21717282d1233627
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009d182698a4727943a65bc6c9ecfd0fc500000000020000000000106600000001000020000000d656462552fab9afe298a2daf8117358dac58434d5c7b1b8cef0606ab75de22f000000000e8000000002000020000000fc9a6712bb1723ca1761ae7713bd3b4dfa878ceb75871234658061ad94f2efd1200000001cdf5d88a11fc51e005602d938bce3ce2332c088193d122fadc66530d42a8b8d400000001b1952a9a4be09643e1945827c1052e71ae747a6291c69beb2574a7474a8d13d7ae7a47340b6a93b2993167163cec98a89d7b05103570a177ce0e4159e2f1662 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 707fc9c03673da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B8E1D871-DF29-11EE-B779-E60682B688C9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416269949" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2628 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2628 iexplore.exe 2628 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2628 wrote to memory of 2700 2628 iexplore.exe 29 PID 2628 wrote to memory of 2700 2628 iexplore.exe 29 PID 2628 wrote to memory of 2700 2628 iexplore.exe 29 PID 2628 wrote to memory of 2700 2628 iexplore.exe 29
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\www.3dmgame.com.url1⤵
- Checks whether UAC is enabled
PID:1424
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2628 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aeaab7b09a4a3dcf666ad58d7e7b2128
SHA1332fa7025ec52f55f4049a3741d48e45ea6efac0
SHA2569b20a4bcc4ba7d83ca77baa6cd9a7d8ef1a90e6f5349250b1994e8852c41df2d
SHA512d1d9df8f646fcaf26a40a492df3740d4db2785a03d7f5935fc487a0611532b5825fbef393140355e8005666bfbf9debc2fb093724f8a0a191ee50bdb3c6b872e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f96d877a64ed3eba33dc44f6f8aff75b
SHA177c297272b92ff1a6620d17816db3bc2c6c92400
SHA2566568557f38ef54e011e0c349a5f4e8940457a3b08843b5c20aada3ba421aea7d
SHA512b44954d7ff1dc6e8ec36af92abeb0f57768a0c1d3d22f233d3b1501d96a691580c1baf1c99c26242cd91266fa4b1a365f9f038305a9bf007487ea4a3ce09583d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cdf424c6467fba2b0ec0ae5d44f0028
SHA1a916e0aa47bbac44266485325312f99471417079
SHA2561eef6d4cbb33ffe1f0252af8e9170f4bd19dbf94f7e55974d53789b6d0024d87
SHA5124918ead458e838ee438c10f636ee2297266ff89ea867c6c1629841dac5e3831ba16fd65657bf1ebf4dea6d76ddabe677e8a0582085f2907352072761e95f0f1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9cd8d5a99f6b324714f18158e296ded
SHA13dbe3c038545ce1ae33bd67bd260d587721802a0
SHA2562a39371600111727653a1025e345792c436b40ad3422ea1bc65057398ee6bef4
SHA512e7bec4702fd0f1776e05c7d5e8f2489072538d460fa2375fbd88c8a6b6d2fb27f03b603e5355eeafa2af37ec8318627a11b0cad8c30d894e2b8d93da57b1e68a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515aba1c7deed2e42f48bd72cfa4aee79
SHA1c6fd60a01699760df28fc52583f5109075b76c91
SHA25650bb62968d4f7e4b872518518ce8441fe0e7ffc0760ef05536ab5bbac911f371
SHA512b93d9cf9fdc4855cac08f32b9a11838755d1fcba4fab390172b7ec694d7b01bc5faed29ccfc44bc571b0402d40cccde3b4352f47c9b52975f9bb8700cbb81054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c05fe3a2806386bb33e225921aa870ef
SHA1ff55ae5b1a8a273bf512693649a2356701974618
SHA256d192029a745a06cef69f355714bf10b9c10d9372cc1e41f01df680288d0dd3c3
SHA5120930962664c14cf48a740d258531c05fe40d2e4fb8e01cde72c8c9473dce4f21eeb72c162126dd3aa943ea5f4531ae32208b03775437387ce2b469f2cfd4bec0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cb7b02956051a00b515d24436c25614
SHA185ac8439f0cc817c74ababa2ad9495f25c6c417e
SHA256d33bd39c198c50cb402a0393aa2849eadaec83df83ab677944e0668552f3b8ef
SHA512df02a1968aa11b9f6d067a7a9fc54fc2db1f5812afda20055cb94df2e548fe1b37f143c3ccb9f3332bcc8198032ddb6590e459e53375b761e76aeb8932f74062
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5058753d5a7a95e8f5d8c580e58a2c050
SHA1b81ba119d4a19feb84caf0fccba68462f4c16ff5
SHA256ba5f9f8ade4f224b4f12c39623e21dd9dd699679b8835d7e66e9195249b08d4d
SHA512d55640255d29b98a0da3eedf641481c0a2932ec19347e5009b5b7dcb85a61927914dc54bbd280c69f1a7920d794c33e3e14234a247ce05e91c053e4357d58367
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529d2b9a95f1ba170efd8d0d0e90cf7be
SHA1a17fa8407b3549522f3b70c403a1f6faf4d54d4a
SHA2566a2396f9ff0c0f3e9d47e65b7b8ce8ca0af2653ddaf4e4e3462649adb41e2ea4
SHA5129502004e536e0ad6c1aa52db0bd8be5341cd68430529c4eea0864bf158d3d13ec7762edeb508a079300a831799aba8dc960a69abbf84219be44e602809d3f463
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c04d52377887627e5222f715d9ecd00
SHA1e37c1fd77761d9b665ab59568a0ea2ab2dab9e49
SHA2569a2a78065e04a253cced5b5c80886a7404fe6e1e31a75a801651f2fb5f5eadb2
SHA5126340ce90663e4cce0993486f06f49ec4d7682b4472bf84da5bacd767569a69d1742bddb558fb3d37490deef18bc8f605b2a69bb5475d3cb4d1c21df3ddf44f23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b1a0f5eb0759a95bb2eb5e3ff36f293
SHA164bf46069ad06ab2146b6773cde47607ed1c871a
SHA2566dc8eb02ed01d0d0c2892b9d024c2179c74c07c6d125c18839f21e99fc2570bc
SHA512e062a8b5f751dc87fb430cdd9978a2898e2ac7cb8e35559bb7bbd090c46ba57a29098822570330377576f409925734d1b45467dd78546faca4d94f3cfebabc96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f4f0edeef1489c21d5a2cf7b8165346
SHA18f0fac026aedf6a2e9c4a8e5d9d7e7326fc6ede9
SHA256eb48ba2b64eb7d142e5e3cccf7c3fd69c94465c7fa66fbde1a92aa7800820dff
SHA5122025474a913dcc1d7e49bc3f1cb2a88389bd84562433d9707ab3f240b4e6274ab9a432c380d025d9d81e1047a4811e914abcd5689a80af9004fcffe3a8797279
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63