Analysis
-
max time kernel
149s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
26/03/2024, 13:06
Static task
static1
Behavioral task
behavioral1
Sample
Harry.Potter.and.the.Sorcerers.Stone/Harry Potter/System/HP.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Harry.Potter.and.the.Sorcerers.Stone/Harry Potter/System/HP.exe
Resource
win10v2004-20240226-en
General
-
Target
Harry.Potter.and.the.Sorcerers.Stone/Harry Potter/System/HP.exe
-
Size
136KB
-
MD5
7523f60d502b93a5ace911a32d0d0ef7
-
SHA1
9aad58812940d27c7cd96d2920c726cc2d2fdde9
-
SHA256
0c274cb13c49893fd56dac30fb87177ab3fa178762a9271572a75063da251417
-
SHA512
46ec53d86816c3ea532cd69f4f8e22e2a233f0f1e97e6b15c97eb1aadbe4c9d39e60a1e3d7faccad677318695476a317613a56475323e37ed8e962d37099e4fc
-
SSDEEP
1536:KHJ0mjPWMlPO+t+/U1gJKy0tCxfNxLKCNasI6Dxv9aGS0941vCgJMN:7A7lPiU1mSMxf34sIwxv9aGVuCgG
Malware Config
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 5 1984 rundll32.exe 7 1984 rundll32.exe 10 2532 rundll32.exe 11 2532 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX\OOBGameInstalled = "1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX\ServiceLocation rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX\ServiceLocation rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1972 HP.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1972 HP.exe 2120 HP.exe 1972 HP.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1972 wrote to memory of 1984 1972 HP.exe 28 PID 1972 wrote to memory of 1984 1972 HP.exe 28 PID 1972 wrote to memory of 1984 1972 HP.exe 28 PID 1972 wrote to memory of 1984 1972 HP.exe 28 PID 1972 wrote to memory of 1984 1972 HP.exe 28 PID 1972 wrote to memory of 1984 1972 HP.exe 28 PID 1972 wrote to memory of 1984 1972 HP.exe 28 PID 1972 wrote to memory of 2120 1972 HP.exe 29 PID 1972 wrote to memory of 2120 1972 HP.exe 29 PID 1972 wrote to memory of 2120 1972 HP.exe 29 PID 1972 wrote to memory of 2120 1972 HP.exe 29 PID 1972 wrote to memory of 2120 1972 HP.exe 29 PID 1972 wrote to memory of 2120 1972 HP.exe 29 PID 1972 wrote to memory of 2120 1972 HP.exe 29 PID 2120 wrote to memory of 2532 2120 HP.exe 30 PID 2120 wrote to memory of 2532 2120 HP.exe 30 PID 2120 wrote to memory of 2532 2120 HP.exe 30 PID 2120 wrote to memory of 2532 2120 HP.exe 30 PID 2120 wrote to memory of 2532 2120 HP.exe 30 PID 2120 wrote to memory of 2532 2120 HP.exe 30 PID 2120 wrote to memory of 2532 2120 HP.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Harry.Potter.and.the.Sorcerers.Stone\Harry Potter\System\HP.exe"C:\Users\Admin\AppData\Local\Temp\Harry.Potter.and.the.Sorcerers.Stone\Harry Potter\System\HP.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\gameux.dll,GameUXShim {f46b9fd7-537c-4dab-82f3-b2217985e494};C:\Users\Admin\AppData\Local\Temp\Harry.Potter.and.the.Sorcerers.Stone\Harry Potter\System\HP.exe;19722⤵
- Blocklisted process makes network request
- Modifies registry class
PID:1984
-
-
C:\Users\Admin\AppData\Local\Temp\Harry.Potter.and.the.Sorcerers.Stone\Harry Potter\System\HP.exe"C:\Users\Admin\AppData\Local\Temp\Harry.Potter.and.the.Sorcerers.Stone\Harry Potter\System\HP.exe" testrendev=D3DDrv.D3DRenderDevice log=Detected.log2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\gameux.dll,GameUXShim {f46b9fd7-537c-4dab-82f3-b2217985e494};C:\Users\Admin\AppData\Local\Temp\Harry.Potter.and.the.Sorcerers.Stone\Harry Potter\System\HP.exe;21203⤵
- Blocklisted process makes network request
- Modifies registry class
PID:2532
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD541e8d38c4e901d54e3e55bf320cdd4b7
SHA1a6355c97be4ec2f4dd81f2ec4ac8f226d3da2180
SHA256712619c3b8b992b6cee07ef16a2acffb616eff7818017f9a2fcd92bf087b9891
SHA51261c828b23472a2c3fae54406fc199a954380bcf7e9597233e12f502d85bbfb16daa2f94e9cef6884f1f1dbcac698e4d5d48b7473026725daec47c1f32adde521
-
Filesize
10KB
MD5b9e0deba81e255e9719c333a953f86ca
SHA1911e735773b00b6ffc80a7584d0c4e3a94e64d65
SHA256f4e93a0e2a3e7821456d9a53f61c4b72aa7f89a5c8f7e48e4ea70b10b3091759
SHA512a70b761ada2bced2215837e123c0754c37de997591536d6255a1129279bd40aeea2f98161558a73a32aa3b6f00480aecf275944f8ad0ae1c568459a34af84ac1
-
Filesize
4KB
MD5a4f6d3fb15fe2d5e580c0770f1444e26
SHA15aa4c4572b2845fdaec2473dba4905fbaea07165
SHA256954f30b3a6e8d9ac701656c8714d0761f13f969a8ce8542c7259e0b70b3b1548
SHA51284078bc20102ca5c89ea0b5bf46a9a4b334118a0d2f009a51abe5584bcf0513615a3eb11872ac325d7c2fbc01974abb3f908856f5c609e40fa433f6afb9e5386