Analysis
-
max time kernel
1561s -
max time network
1562s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
18/04/2024, 17:18
Static task
static1
Behavioral task
behavioral1
Sample
Install-GooglePlayGames-Beta.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Install-GooglePlayGames-Beta.exe
Resource
win10v2004-20240412-en
General
-
Target
Install-GooglePlayGames-Beta.exe
-
Size
10.5MB
-
MD5
ee33d017b5fafcd463c5660fcc5de8dc
-
SHA1
a1285ecdcfd1c46877a751aaea49b476bb9f4cb5
-
SHA256
953920dc9b464887366366b0a8e1fb63ee819c880ed0a34a31b7e8ef21833371
-
SHA512
f99a4bd76a07465b12e138c563557ec88e28698249d48268e53849fa50ae21787d3ac66e86cdcadf399aefd87bc9d33eca602ea932ff4ce11fbf16e85fa980ba
-
SSDEEP
196608:dCJBYlzkSIEc+waFvtCK4BbCSC3qzF1/goaSZzpBM:cUzkSU+FvV47Ccz/goa03
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2644 crashpad_handler.exe -
Loads dropped DLL 4 IoCs
pid Process 2360 Install-GooglePlayGames-Beta.exe 2360 Install-GooglePlayGames-Beta.exe 2360 Install-GooglePlayGames-Beta.exe 2360 Install-GooglePlayGames-Beta.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2644 2360 Install-GooglePlayGames-Beta.exe 28 PID 2360 wrote to memory of 2644 2360 Install-GooglePlayGames-Beta.exe 28 PID 2360 wrote to memory of 2644 2360 Install-GooglePlayGames-Beta.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Install-GooglePlayGames-Beta.exe"C:\Users\Admin\AppData\Local\Temp\Install-GooglePlayGames-Beta.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\pwce0fyg.f4d\crashpad_handler.exeC:\Users\Admin\AppData\Local\Temp\pwce0fyg.f4d\crashpad_handler.exe --no-rate-limit "--database=C:\Users\Admin\AppData\Local\Google\Play Games\CrashReporting\Crashpad" --url=https://clients2.google.com/cr/report --annotation=prod=Battlestar --annotation=ver=24.1.1687.0 --initial-client-data=0x418,0x41c,0x420,0x3e4,0x424,0x7fef13452c8,0x7fef13452d8,0x7fef13452e82⤵
- Executes dropped EXE
PID:2644
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
961KB
MD57b3f74266ca7cc7329eac63f8368db65
SHA1db49159afcdf3676d6a6bc791f8f7c26ceeeb145
SHA2569335fe5ed02defb1395ab3e02926edbf90205c40d2e8bfb6247df102307ba557
SHA512930c4f1eeba8b1daf62ea3a29458dbcdd58c30c924d4e5ed5dc16073fafa7a8e2887c2e9627f970d197f848637f58b8cca6bd298a066e78c5d8eab7e0995bbb1
-
Filesize
1.1MB
MD5168e890d04cfee8b8420c90d1d229364
SHA1442f93cb1272b93cc3073f8eeb0732a3c60bc5c9
SHA256f37ed95b97a9c6d6d48c2675defaa53e68b487d271e78294d1af3a431ac25b91
SHA51229d4d3d3a880c70c8c44ea1496f09f4ca1bcbe071dd81e8c700a53d070d8240d0d819a9fe356f175554075a089f6945d7f6390fb1dcf4a152c064a71df3fa48a
-
Filesize
4.5MB
MD528f06bc35021d85a98539a035b2c9a71
SHA18d36ecb2b9e5270c1c5ac81bcd9bf858e9f61a8c
SHA256231014af8dbc27ac20b222a00a2c3dfda4e0aa111fb710d7315b5b19e47a2f57
SHA512cfec5eadc5cca9bc48006a80bca181ecf7949a2b9582ff5ca3ea577ec5892a10a8d4897fbc3e6eeb5b4a1b2de3d42d703cd2dae4c982668f93968e2de2e8599e