Analysis
-
max time kernel
120s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
21-04-2024 09:39
Static task
static1
Behavioral task
behavioral1
Sample
Forza-Mods-AIO.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Forza-Mods-AIO.exe
Resource
win10v2004-20240412-en
General
-
Target
Forza-Mods-AIO.exe
-
Size
8.1MB
-
MD5
6d6017acd63d1b7544e6646434fd0304
-
SHA1
e13f06bf9031ac15d7bf0c032b11a8db1af6da43
-
SHA256
054cde7e8789ab43280ff6c5347c0f0768e0f9fa1be6f90cd1554c0138448bfa
-
SHA512
62065b08b0e5e364cb4cdcc7f4db7498d351954d23f4fb2f355f7e7709ee9e2325fc799ea40adabf9580ee4c305f6f5e3334eafd6c4d84454ed64df50d966aa7
-
SSDEEP
49152:43IJB/b53as1gM2bq7mTv+iru2ICLt/YUdj/g5t2gQlX03yEFNR3hIhwkm2vysy6:J151MysDlXV2phIME9o4Ey
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000003e5dd6671d77ddcc1c2a6ad7e27b9f8e25393cb006ba4c773629d3fe492f1534000000000e8000000002000020000000fea284102e8aa372314e7d42413543a76df052d4067208179cade7607d3e2fdb20000000048e458530881de4b2230c3e47bc9ae3331caa83bdcf8904124bbef1ae286f56400000005faacd59b4f645280d643dceb707b82aeffa878566ca51529a593fed851a2bf984a907050fd9e7f1fe4ea3ce202017950e2d05468cdf8173b07111da3aae5aac iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419854294" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2C1F6A51-FFC3-11EE-A499-62A279F6AF31} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0cfbc02d093da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2020 iexplore.exe 2020 iexplore.exe 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2020 2784 Forza-Mods-AIO.exe 28 PID 2784 wrote to memory of 2020 2784 Forza-Mods-AIO.exe 28 PID 2784 wrote to memory of 2020 2784 Forza-Mods-AIO.exe 28 PID 2020 wrote to memory of 2636 2020 iexplore.exe 30 PID 2020 wrote to memory of 2636 2020 iexplore.exe 30 PID 2020 wrote to memory of 2636 2020 iexplore.exe 30 PID 2020 wrote to memory of 2636 2020 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Forza-Mods-AIO.exe"C:\Users\Admin\AppData\Local\Temp\Forza-Mods-AIO.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=x64&rid=win-x64&os=win7&apphost_version=8.0.3&gui=true2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2636
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562d80844761a8d334adc34e91c71af7c
SHA1d4c2200a4197a43f55505cc65a52fc495bd1c661
SHA2564b875ce4e921a94237ff21f08976afd1d85a399c88ca6577a5e30fcd758b372f
SHA512386e7e143e5209649fbc47ed62ffa91543cf329ca93d3bf3cdc0cb777290d24717c7bc77d6e6be1b5b18713e2bc36e509b58943f25266e8356b22aae4e93f67a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5174f644a17df67621bc9ba7313e19710
SHA1fd4055c86e3c852c077f8fe4d6ebb5ba9c21e560
SHA256f4a5cb0056926bd58f2e7d58a80f85b58276ae8b2c15717776e04f2b7791c28e
SHA5121e899e859ccc27c63d3f414f4e467f2a8ee921d254a6c328d96c04c0d6cd2f19458fe2634d408e36829cd7ec75962c9bee58a40469940eb621bad1f5d27f9ccd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591f0292df89263849508fbd90f04308f
SHA17ae5d9b8e91cd06ab5f51eedc9b84d479445325d
SHA2565b32d17b1ac3dcb8787a6afd44b0679b2c4174458e67822cdb33a52e1fbf2681
SHA51214f8a4510d8a462dc48acc6b9c4f33f77b2530dee840d7939419945c900a255fbb08898df671acceafbbcf4725af9f88c8aa24f89bb8034f81cbb7913e86366e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c2f02c10004bf2c01d69d5e7b19c463
SHA1e619618b84d8dadd108a9b1c686f87f181b4d3d4
SHA256f41f169758b52fc138555f01b1561391513dfc2b928b2e4f5e3a266981b1f8b6
SHA51250ede221ea53a7ca6d0a145a4316815fd77aedb5a9da2a5fd634318560f7ce2e43f10d148a1f2bff96de8d8f1c6b1b9f12579fafddc313d7fac891852a9bbb9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e625aecf548ea1124459b0b27ff64f9
SHA1ffe731bc8fe087dc5d0ca0e4b45ef8cdbe970e6f
SHA256bd8984fb9890e9d3801cb8d1d6d0d879da9c3be52fdd56b041f3bbba82b7b845
SHA51287e68471ca68d148949c6d8e320c54bb263b466ab88fae74db08a05d63aee98d98af9f4fc02137f959394775ec6c38962c5a16b45f9b8e885f2256b2813076d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503ee61a96a5a8276be658893f0632683
SHA1090ad20ce7c71756ca6f9030229d374dd4eb593e
SHA2567335e9cb6281d8fef3692c6feb62c0f24f378d2dc8d8168693f1cd63253f0f05
SHA5128de9059170ed070acfefed485d5e39b54620dcc3598a511df95dc7c3e620eac8e86422ad8a36291f5d379856e473e3e7954117dd1c6174c8d3d75fcd36d9ac01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7961ce20bfe55d294e5a1e8fda51300
SHA1ad32506ae958866f096871beabb00a67ee300682
SHA25661eeab11f243791e44a1627fe13593a49eef2d152ed5394df3c9b281bd89463c
SHA5126ace325ee9448b849dc85a926e11a41541ff4e8d453b9a8c720d3cd24604ecaf8796c847fd9cc30828155badbb80a4f70aebde102e2697fa3f67616e3205898a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf2ee2bef006853ee9fbd3ca7c10ac94
SHA141475958fef8588f3298578ad1c1d808fde95e70
SHA2564904410a50f3e72c83fc4dccf5129e67dc70f0f8b574b8bac529b77f50aab86d
SHA512d68d5e03e7c6acf69b172434239f66061541af5d7eb63fd7f8e07b2dca1549800bfdf4feb91631f77de9b3f54444a7b498e4c834622f88c2015445012ce0c53b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa62a49ccf4f28b73c89f9472901455e
SHA1037420b27d3cb85aca68d2c1a9e279e99d49bf02
SHA25693be5d30ee3a508ea61de2a7731631543d7b9599c9dbbee6019efce64af2d9eb
SHA5127ce2f7ec00b6f2a253dad5660d03ea6f7eabd6acdf4db819a740437c6a65844a5c98d74faa65d75383a5009a5416e5e9bd9e35587365f62e8133d54eda504ef2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5421d611ab30cf09f4577b9821f24ef9c
SHA193af5a517af8b9de0e3740667294b4a968a7ffbd
SHA256c03b2c54848f9474335e16484d94c52f378c9b11d9a36b7ef464bd53eb8205a7
SHA51273fa5d42d73a6f844a8b9cd7603b8b69497fb8468b37f334d2fd9a553d3bcb072b309e45a7c412fd02ee5d8382a95d6f96d8c30659c5ed058df06a235ba0b6c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c289771b84b4f11a82daade35ca32614
SHA13fcec487234f8a26dfc5c1267665923821375b13
SHA2560ccd9fa09a547f35a9ea82a5fba86a20c58457638aa37618dc85b8d64d063d05
SHA5120f334786e1439bb68108b0e43ef6347b0735a8b88c68f537d553bc03add13d284ea56c920de9eb885e74a6298ca79c6b33ad59e120c5a89a07a0d521b6dcc63d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d88f8b1189218058bd3e334d7f647ff4
SHA1b327f95f2b8e2f9da77776094370bc491d30ab75
SHA2562484364bd42000fd1650eb7ac2ccd33fd49c88cf4282be9d5d557bd00cf99206
SHA5123ed1eea9db50f8879b4d14deb7dc541b8a51a0fc00330112a5d958948b5f1163437c88c39bace48c5ea3ede8ee445335782c9e361faaf5ce119e8b304cf6c538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0bccd2b320af1acfa9736b5a4af9348
SHA1522c7cd15b2cf6fedb0d6088fd364cb605550ba1
SHA256db35913340822668c5f05c5267f0c0ad5937aa7558b855a0f37f48c78e6cf708
SHA512da3ba14aa8b0e2aeefcb96c72b99c2af498daa165920e6ca714468e18b6d942937f4f1ed3144c43df78c1d30d93f3c6b2df3c716ff15c5b6251b958d32571200
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5990f64a730d7e78a5550ab67288f09e3
SHA1b74d938a5410fa8c560c912f9705fcfade533bbe
SHA2564f379a4ab320ff1f4a19057f278722c56c0648c0356e5a3a4853455f3a3b945b
SHA51205dfa3e930deb25bf1bbca3f7d8f5f06fca98f59ef4b0d29f7a5fe870f4073310db9ddb64d2c501106cfa9b45f444971a52a1b40175626308da9528db4ff0526
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a