Resubmissions

17/04/2024, 09:27

240417-levmkaah66 8

16/04/2024, 15:27

240416-svq3msde45 8

Analysis

  • max time kernel
    150s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16/04/2024, 15:27

General

  • Target

    e00b253eda798487f5fef2ef25164fd8.exe

  • Size

    126KB

  • MD5

    e00b253eda798487f5fef2ef25164fd8

  • SHA1

    cf2c21c845f16ed144487e9f86d8b5ba8376008b

  • SHA256

    c60c7061f20c6cf9645da0ebf22b143913038a93d9358c2693430e1925d6114b

  • SHA512

    bd3dd458dfe3cc38c3ac24a53bf96f7362052fedda39df8aa13ce41a250ce27ecd55068898d4c21e1622f7542891b82adc1b2d884684bf080080bfded7f17d13

  • SSDEEP

    1536:duokBZMKvOsg8ISIv47rz0D+/R/Av3coL6+9D8rbBuS7BeAXJ6xkRQsN5xgSF:RkBGWOsTIJgIDU5A/coLx9DoBRe/xK1F

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 17 IoCs
  • Loads dropped DLL 64 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 4 IoCs
  • Modifies Control Panel 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e00b253eda798487f5fef2ef25164fd8.exe
    "C:\Users\Admin\AppData\Local\Temp\e00b253eda798487f5fef2ef25164fd8.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Users\Admin\AppData\Local\Temp\setup.exe
      "C:\Users\Admin\AppData\Local\Temp\setup.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2540
      • C:\Users\Admin\AppData\Roaming\Pinball\Pinball.exe
        C:\Users\Admin\AppData\Roaming\Pinball\Pinball.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies Control Panel
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1068
        • C:\Users\Admin\AppData\Roaming\Pinball\Pinball.exe
          "C:\Users\Admin\AppData\Roaming\Pinball\Pinball.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Modifies Control Panel
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2144
          • C:\Users\Admin\AppData\Roaming\Pinball\Pinball.exe
            "C:\Users\Admin\AppData\Roaming\Pinball\Pinball.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:2696
          • C:\Users\Admin\AppData\Roaming\Pinball\Pinball.exe
            "C:\Users\Admin\AppData\Roaming\Pinball\Pinball.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:2764
          • C:\Users\Admin\AppData\Roaming\Pinball\Pinball.exe
            "C:\Users\Admin\AppData\Roaming\Pinball\Pinball.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1120
          • C:\Users\Admin\AppData\Roaming\Pinball\Pinball.exe
            "C:\Users\Admin\AppData\Roaming\Pinball\Pinball.exe"
            5⤵
            • Executes dropped EXE
            PID:2776
        • C:\Users\Admin\AppData\Roaming\Pinball\Pinball.exe
          "C:\Users\Admin\AppData\Roaming\Pinball\Pinball.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:2204
        • C:\Users\Admin\AppData\Roaming\Pinball\Pinball.exe
          "C:\Users\Admin\AppData\Roaming\Pinball\Pinball.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:992
        • C:\Users\Admin\AppData\Roaming\Pinball\Pinball.exe
          "C:\Users\Admin\AppData\Roaming\Pinball\Pinball.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1720
        • C:\Users\Admin\AppData\Roaming\Pinball\Pinball.exe
          "C:\Users\Admin\AppData\Roaming\Pinball\Pinball.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2512
        • C:\Users\Admin\AppData\Roaming\Pinball\Pinball.exe
          "C:\Users\Admin\AppData\Roaming\Pinball\Pinball.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:872
        • C:\Users\Admin\AppData\Roaming\Pinball\Pinball.exe
          "C:\Users\Admin\AppData\Roaming\Pinball\Pinball.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2552
        • C:\Users\Admin\AppData\Roaming\Pinball\Pinball.exe
          "C:\Users\Admin\AppData\Roaming\Pinball\Pinball.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Modifies Control Panel
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2880
          • C:\Users\Admin\AppData\Roaming\Pinball\Pinball.exe
            "C:\Users\Admin\AppData\Roaming\Pinball\Pinball.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies Control Panel
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2472
          • C:\Users\Admin\AppData\Roaming\Pinball\Pinball.exe
            "C:\Users\Admin\AppData\Roaming\Pinball\Pinball.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:2020
          • C:\Users\Admin\AppData\Roaming\Pinball\Pinball.exe
            "C:\Users\Admin\AppData\Roaming\Pinball\Pinball.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:1744

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Pinball\Newtonsoft.Json.dll

          Filesize

          560KB

          MD5

          8f81c9520104b730c25d90a9dd511148

          SHA1

          7cf46cb81c3b51965c1f78762840eb5797594778

          SHA256

          f1f01b3474b92d6e1c3d6adfae74ee0ea0eba6e9935565fe2317686d80a2e886

          SHA512

          b4a66389bf06a6611df47e81b818cc2fcd0a854324a2564a4438866953f148950f59cd4c07c9d40cc3a9043b5ce12b150c8a56cccdf98d5e3f0225edf8c516f3

        • C:\Users\Admin\AppData\Roaming\Pinball\Uninstall.exe

          Filesize

          113KB

          MD5

          f4b4605b9a33166a894e61b7d83795db

          SHA1

          cc634b064afb9bbca03007c2184d56d5d50e01f2

          SHA256

          bce3c5d714c7b4e5e456b9c955fe8328526168cd694a873f48f6b36d679b4fe2

          SHA512

          a8a16cc32d71b3e3fc6adf2a43f366f4d02c8a258bbbe05b67047b7629a0f9ff8b5ea2bdd0d0ae074250a1bb2d44f3da16bf4210a797dcf8178924bf0c566860

        • C:\Users\Admin\AppData\Roaming\Pinball\Xilium.CefGlue.dll

          Filesize

          855KB

          MD5

          b03c7f6072a0cb1a1d6a92ee7b82705a

          SHA1

          6675839c5e266075e7e1812ad8e856a2468274dd

          SHA256

          f561713347544e9d06d30f02a3dfcec5fe593b38894593aeedf5700666b35027

          SHA512

          19d6792eb9ba8584b94d0d59e07ce9d1c9c4da5516490f4abce5ae0d7d55b357bda45b2093b3e9eb9d6858061e9d3f530a6655c4779a50c911501ae23925c566

        • C:\Users\Admin\AppData\Roaming\Pinball\libcef.DLL

          Filesize

          168.3MB

          MD5

          f5259cc7721ca2bcc8ac97b76b1d3c7a

          SHA1

          c2fc0c8396d8cd6764809a2a592972e2ebca64ba

          SHA256

          3fe6a262ef01cb8fd4dc2d4373de0f1f0a89ee51953452ed4557cb55f1da9ab4

          SHA512

          2d01b1f2b24717eff37965bbc32d167434a65f3dfff74342d2e2fa8fbb0e97c3f61fdf673a13ad63031d630d9ce46a6f9f0c4f89ebd30c31f3ea55817b9d1331

        • C:\Users\Admin\AppData\Roaming\Pinball\log4net.dll

          Filesize

          269KB

          MD5

          7ea1429e71d83a1ccaa0942c4d7f1c41

          SHA1

          4ce6acf4d735354b98f416b3d94d89af0611e563

          SHA256

          edec54da1901e649588e8cb52b001ab2aec76ed0430824457a904fcc0abd4299

          SHA512

          91c90845a12a377b617140b67639cfa71a0648300336d5edd422afc362e65c6ccd3a4ff4936d4262b0eaf7bae2b9624bcd3c7eec79f7e7ca18abe1ec62c4c869

        • \Users\Admin\AppData\Local\Temp\nsi5255.tmp\INetC.dll

          Filesize

          21KB

          MD5

          92ec4dd8c0ddd8c4305ae1684ab65fb0

          SHA1

          d850013d582a62e502942f0dd282cc0c29c4310e

          SHA256

          5520208a33e6409c129b4ea1270771f741d95afe5b048c2a1e6a2cc2ad829934

          SHA512

          581351aef694f2489e1a0977ebca55c4d7268ca167127cefb217ed0d2098136c7eb433058469449f75be82b8e5d484c9e7b6cf0b32535063709272d7810ec651

        • \Users\Admin\AppData\Local\Temp\nsi5255.tmp\nsProcess.dll

          Filesize

          4KB

          MD5

          faa7f034b38e729a983965c04cc70fc1

          SHA1

          df8bda55b498976ea47d25d8a77539b049dab55e

          SHA256

          579a034ff5ab9b732a318b1636c2902840f604e8e664f5b93c07a99253b3c9cf

          SHA512

          7868f9b437fcf829ad993ff57995f58836ad578458994361c72ae1bf1dfb74022f9f9e948b48afd3361ed3426c4f85b4bb0d595e38ee278fee5c4425c4491dbf

        • \Users\Admin\AppData\Local\Temp\nso1F36.tmp\liteFirewall.dll

          Filesize

          81KB

          MD5

          165e1ef5c79475e8c33d19a870e672d4

          SHA1

          965f02bfd103f094ac6b3eef3abe7fdcb8d9e2a5

          SHA256

          9db9c58e44dff2d985dc078fdbb7498dcc66c4cc4eb12f68de6a98a5d665abbd

          SHA512

          cd10eaf0928e5df048bf0488d9dbfe9442e2e106396a0967462bef440bf0b528cdf3ab06024fb6fdaf9f247e2b7f3ca0cea78afc0ce6943650ef9d6c91fee52a

        • \Users\Admin\AppData\Local\Temp\setup.exe

          Filesize

          102.2MB

          MD5

          f6c955039d8d0158871eaa4742cf9b42

          SHA1

          8c8af212b3e15eb8642ace3f93ed549547ec925b

          SHA256

          082acf311a0c64d1d96cfaeae5f2b43409eb4463e21700748965e21b718f2353

          SHA512

          4dc41a01fc59467de515aeb5dcdf0856db7c2258b400039643711d658184b97bfbcbc4814d1ce65ace022c3a1381ddfb3b0273f423bfc141d7342235159a21e3

        • \Users\Admin\AppData\Roaming\Pinball\Pinball.exe

          Filesize

          183KB

          MD5

          7c29fb72d1b284f81245d2d09f7b5d7e

          SHA1

          5a944edbd670dd8daa5a94de8be82fd7b5122b7f

          SHA256

          6baca4ab95c86bbc783842cb57e80c71be5c3ca379d54b4f279d939af3b416b4

          SHA512

          fb0ca73a86f852ee9b2557c62fef2f7b8ca905a0cb085cfab279d9cf8fd0cb6dee8f19d66d3a218a6f61a8ff6cad06636e6641340895648ac46969beacb5e144

        • memory/872-198-0x0000000073F60000-0x000000007464E000-memory.dmp

          Filesize

          6.9MB

        • memory/872-222-0x0000000073F60000-0x000000007464E000-memory.dmp

          Filesize

          6.9MB

        • memory/992-199-0x0000000073F60000-0x000000007464E000-memory.dmp

          Filesize

          6.9MB

        • memory/992-183-0x0000000004970000-0x00000000049B0000-memory.dmp

          Filesize

          256KB

        • memory/992-167-0x0000000073F60000-0x000000007464E000-memory.dmp

          Filesize

          6.9MB

        • memory/1068-133-0x0000000073F60000-0x000000007464E000-memory.dmp

          Filesize

          6.9MB

        • memory/1068-154-0x0000000073F60000-0x000000007464E000-memory.dmp

          Filesize

          6.9MB

        • memory/1068-155-0x0000000004990000-0x00000000049D0000-memory.dmp

          Filesize

          256KB

        • memory/1068-148-0x00000000053C0000-0x0000000005450000-memory.dmp

          Filesize

          576KB

        • memory/1068-144-0x00000000050C0000-0x000000000519C000-memory.dmp

          Filesize

          880KB

        • memory/1068-207-0x0000000073F60000-0x000000007464E000-memory.dmp

          Filesize

          6.9MB

        • memory/1068-140-0x0000000004990000-0x00000000049D0000-memory.dmp

          Filesize

          256KB

        • memory/1068-137-0x0000000000320000-0x000000000036A000-memory.dmp

          Filesize

          296KB

        • memory/1068-132-0x0000000000EE0000-0x0000000000F14000-memory.dmp

          Filesize

          208KB

        • memory/1120-217-0x0000000073F60000-0x000000007464E000-memory.dmp

          Filesize

          6.9MB

        • memory/1720-190-0x0000000073F60000-0x000000007464E000-memory.dmp

          Filesize

          6.9MB

        • memory/1720-206-0x0000000073F60000-0x000000007464E000-memory.dmp

          Filesize

          6.9MB

        • memory/1744-226-0x0000000073F60000-0x000000007464E000-memory.dmp

          Filesize

          6.9MB

        • memory/1744-223-0x0000000000540000-0x0000000000580000-memory.dmp

          Filesize

          256KB

        • memory/1744-221-0x0000000073F60000-0x000000007464E000-memory.dmp

          Filesize

          6.9MB

        • memory/2020-220-0x0000000073F60000-0x000000007464E000-memory.dmp

          Filesize

          6.9MB

        • memory/2020-227-0x0000000073F60000-0x000000007464E000-memory.dmp

          Filesize

          6.9MB

        • memory/2020-224-0x0000000004930000-0x0000000004970000-memory.dmp

          Filesize

          256KB

        • memory/2144-216-0x0000000073F60000-0x000000007464E000-memory.dmp

          Filesize

          6.9MB

        • memory/2144-159-0x0000000073F60000-0x000000007464E000-memory.dmp

          Filesize

          6.9MB

        • memory/2144-162-0x0000000004930000-0x0000000004970000-memory.dmp

          Filesize

          256KB

        • memory/2204-177-0x00000000047D0000-0x0000000004810000-memory.dmp

          Filesize

          256KB

        • memory/2204-200-0x0000000073F60000-0x000000007464E000-memory.dmp

          Filesize

          6.9MB

        • memory/2204-172-0x0000000073F60000-0x000000007464E000-memory.dmp

          Filesize

          6.9MB

        • memory/2472-230-0x0000000004AA0000-0x0000000004AE0000-memory.dmp

          Filesize

          256KB

        • memory/2472-229-0x0000000073F60000-0x000000007464E000-memory.dmp

          Filesize

          6.9MB

        • memory/2472-228-0x0000000004A10000-0x0000000004AA0000-memory.dmp

          Filesize

          576KB

        • memory/2472-218-0x0000000073F60000-0x000000007464E000-memory.dmp

          Filesize

          6.9MB

        • memory/2472-219-0x0000000004AA0000-0x0000000004AE0000-memory.dmp

          Filesize

          256KB

        • memory/2512-194-0x0000000073F60000-0x000000007464E000-memory.dmp

          Filesize

          6.9MB

        • memory/2552-205-0x0000000073F60000-0x000000007464E000-memory.dmp

          Filesize

          6.9MB

        • memory/2552-195-0x0000000073F60000-0x000000007464E000-memory.dmp

          Filesize

          6.9MB

        • memory/2696-214-0x0000000073F60000-0x000000007464E000-memory.dmp

          Filesize

          6.9MB

        • memory/2696-213-0x0000000000490000-0x00000000004D0000-memory.dmp

          Filesize

          256KB

        • memory/2696-211-0x0000000073F60000-0x000000007464E000-memory.dmp

          Filesize

          6.9MB

        • memory/2764-215-0x0000000073F60000-0x000000007464E000-memory.dmp

          Filesize

          6.9MB

        • memory/2764-212-0x0000000073F60000-0x000000007464E000-memory.dmp

          Filesize

          6.9MB

        • memory/2880-202-0x0000000073F60000-0x000000007464E000-memory.dmp

          Filesize

          6.9MB

        • memory/2880-210-0x0000000000470000-0x00000000004B0000-memory.dmp

          Filesize

          256KB

        • memory/2880-225-0x0000000073F60000-0x000000007464E000-memory.dmp

          Filesize

          6.9MB