Overview
overview
7Static
static
3GAMDIE - F...es.url
windows7-x64
1GAMDIE - F...es.url
windows10-2004-x64
1Pizza Towe...er.exe
windows7-x64
1Pizza Towe...er.exe
windows10-2004-x64
1Pizza Towe...64.dll
windows7-x64
1Pizza Towe...64.dll
windows10-2004-x64
1Pizza Towe...er.dll
windows7-x64
1Pizza Towe...er.dll
windows10-2004-x64
1Pizza Tower/fmod.dll
windows7-x64
1Pizza Tower/fmod.dll
windows10-2004-x64
1Pizza Towe...io.dll
windows7-x64
1Pizza Towe...io.dll
windows10-2004-x64
1Pizza Towe...64.dll
windows7-x64
1Pizza Towe...64.dll
windows10-2004-x64
1Pizza Towe...64.dll
windows7-x64
1Pizza Towe...64.dll
windows10-2004-x64
1_Redist/do...up.exe
windows7-x64
7_Redist/do...up.exe
windows10-2004-x64
7_Redist/dx...up.exe
windows7-x64
7_Redist/dx...up.exe
windows10-2004-x64
7_Redist/oalinst.exe
windows7-x64
7_Redist/oalinst.exe
windows10-2004-x64
6_Redist/vc...64.exe
windows7-x64
7_Redist/vc...64.exe
windows10-2004-x64
7_Redist/vc...86.exe
windows7-x64
7_Redist/vc...86.exe
windows10-2004-x64
7_Redist/vc...64.exe
windows7-x64
7_Redist/vc...64.exe
windows10-2004-x64
7_Redist/vc...86.exe
windows7-x64
7_Redist/vc...86.exe
windows10-2004-x64
7_Redist/xn...st.msi
windows7-x64
6_Redist/xn...st.msi
windows10-2004-x64
6Analysis
-
max time kernel
64s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28-04-2024 17:58
Static task
static1
Behavioral task
behavioral1
Sample
GAMDIE - Free Indie Games.url
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
GAMDIE - Free Indie Games.url
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
Pizza Tower/PizzaTower.exe
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
Pizza Tower/PizzaTower.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
Pizza Tower/Steamworks_x64.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Pizza Tower/Steamworks_x64.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
Pizza Tower/fmod-gamemaker.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Pizza Tower/fmod-gamemaker.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
Pizza Tower/fmod.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Pizza Tower/fmod.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral11
Sample
Pizza Tower/fmodstudio.dll
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
Pizza Tower/fmodstudio.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral13
Sample
Pizza Tower/gameframe_x64.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Pizza Tower/gameframe_x64.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral15
Sample
Pizza Tower/steam_api64.dll
Resource
win7-20240215-en
Behavioral task
behavioral16
Sample
Pizza Tower/steam_api64.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
_Redist/dotNetFx40_Full_setup.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
_Redist/dotNetFx40_Full_setup.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral19
Sample
_Redist/dxwebsetup.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
_Redist/dxwebsetup.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral21
Sample
_Redist/oalinst.exe
Resource
win7-20240419-en
Behavioral task
behavioral22
Sample
_Redist/oalinst.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral23
Sample
_Redist/vcredist_2015-2019_x64.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
_Redist/vcredist_2015-2019_x64.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral25
Sample
_Redist/vcredist_2015-2019_x86.exe
Resource
win7-20240220-en
Behavioral task
behavioral26
Sample
_Redist/vcredist_2015-2019_x86.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral27
Sample
_Redist/vcredist_x64.exe
Resource
win7-20231129-en
Behavioral task
behavioral28
Sample
_Redist/vcredist_x64.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral29
Sample
_Redist/vcredist_x86.exe
Resource
win7-20240215-en
Behavioral task
behavioral30
Sample
_Redist/vcredist_x86.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral31
Sample
_Redist/xnafx40_redist.msi
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
_Redist/xnafx40_redist.msi
Resource
win10v2004-20240419-en
General
-
Target
_Redist/vcredist_x64.exe
-
Size
5.5MB
-
MD5
630d75210b325a280c3352f879297ed5
-
SHA1
b330b760a8f16d5a31c2dc815627f5eb40861008
-
SHA256
b06546ddc8ca1e3d532f3f2593e88a6f49e81b66a9c2051d58508cc97b6a2023
-
SHA512
b6e107fa34764d336c9b59802c858845df9f8661a1beb41436fd638a044580557921e69883ed32737f853e203f0083358f642f3efe0a80fae7932c5e6137331f
-
SSDEEP
98304:EuLgywiNHBeSLxYK/bxE3q/BlZkWMGPQflVJ/EK1sLyzs2T2Q1mOjq4/:V7wqheSVYK/bua/BlWWnuVhsus8nm+qi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4596 Setup.exe -
Loads dropped DLL 5 IoCs
pid Process 4596 Setup.exe 4596 Setup.exe 4596 Setup.exe 4596 Setup.exe 4596 Setup.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Setup.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4596 Setup.exe 4596 Setup.exe 4596 Setup.exe 4596 Setup.exe 4596 Setup.exe 4596 Setup.exe 4596 Setup.exe 4596 Setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3140 wrote to memory of 4596 3140 vcredist_x64.exe 84 PID 3140 wrote to memory of 4596 3140 vcredist_x64.exe 84 PID 3140 wrote to memory of 4596 3140 vcredist_x64.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\_Redist\vcredist_x64.exe"C:\Users\Admin\AppData\Local\Temp\_Redist\vcredist_x64.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3140 -
\??\c:\c0480bd3d4a67eb909\Setup.exec:\c0480bd3d4a67eb909\Setup.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5038a2a7f80ac7042e3f3278c80724e52
SHA128623d9ae5a31ee23f334ff976bea9f1e466d063
SHA256930eb144de71d0bcb362b3eecc95f28e4a26af8c54eb1c7e015a71ebac1407ee
SHA512f2fd6510c97035eb6a2455ce494e28e9e20b610194d49de4fdc2356aa1cbba2fc67f0d515027240213ea227cca3dd25cb7defc0fb85686b4e2b4b446d2569f39
-
Filesize
76KB
MD5006f8a615020a4a17f5e63801485df46
SHA178c82a80ebf9c8bf0c996dd8bc26087679f77fea
SHA256d273460aa4d42f0b5764383e2ab852ab9af6fecb3ed866f1783869f2f155d8be
SHA512c603ed6f3611eb7049a43a190ed223445a9f7bd5651100a825917198b50c70011e950fa968d3019439afa0a416752517b1c181ee9445e02da3904f4e4b73ce76
-
Filesize
141KB
MD53f0363b40376047eff6a9b97d633b750
SHA14eaf6650eca5ce931ee771181b04263c536a948b
SHA256bd6395a58f55a8b1f4063e813ce7438f695b9b086bb965d8ac44e7a97d35a93c
SHA512537be86e2f171e0b2b9f462ac7f62c4342beb5d00b68451228f28677d26a525014758672466ad15ed1fd073be38142dae478df67718908eae9e6266359e1f9e8
-
Filesize
29KB
MD512df3535e4c4ef95a8cb03fd509b5874
SHA190b1f87ba02c1c89c159ebf0e1e700892b85dc39
SHA2561c8132747dc33ccdb02345cbe706e65089a88fe32cf040684ca0d72bb9105119
SHA512c6c8887e7023c4c1cbf849eebd17b6ad68fc14607d1c32c0d384f951e07bfaf6b61e0639f4e5978c9e3e1d52ef8a383b62622018a26fa4066eb620f584030808
-
Filesize
40KB
MD5b13ff959adc5c3e9c4ba4c4a76244464
SHA14df793626f41b92a5bc7c54757658ce30fdaeeb1
SHA25644945bc0ba4be653d07f53e736557c51164224c8ec4e4672dfae1280260ba73b
SHA512de78542d3bbc4c46871a8afb50fb408a59a76f6ed67e8be3cba8ba41724ea08df36400e233551b329277a7a0fe6168c5556abe9d9a735f41b29a941250bfc4d6
-
Filesize
38KB
MD55486ff60b072102ee3231fd743b290a1
SHA1d8d8a1d6bf6adf1095158b3c9b0a296a037632d0
SHA2565ca3ecaa12ca56f955d403ca93c4cb36a7d3dcdea779fc9bdaa0cdd429dab706
SHA512ae240eaac32edb18fd76982fc01e03bd9c8e40a9ec1b9c42d7ebd225570b7517949e045942dbb9e40e620aa9dcc9fbe0182c6cf207ac0a44d7358ad33ba81472
-
Filesize
16KB
MD59547d24ac04b4d0d1dbf84f74f54faf7
SHA171af6001c931c3de7c98ddc337d89ab133fe48bb
SHA25636d0159ed1a7d88000737e920375868765c0a1dd6f5a5acbb79cf7d97d9e7a34
SHA5128b6048f4185a711567679e2de4789407077ce5bfe72102d3cb1f23051b8d3e6bfd5886c801d85b4e62f467dd12da1c79026a4bc20b17f54c693b2f24e499d40f
-
Filesize
40KB
MD54ce519f7e9754ec03768edeedaeed926
SHA1213ae458992bf2c5a255991441653c5141f41b89
SHA256bc4ca5ad609f0dd961263715e1f824524c43e73b744e55f90c703b759cae4d31
SHA5128f2ff08a234d8e2e6ba85de3cd1c19a0b372d9fca4ff0fc1bba7fe7c5a165e933e2af5f93fc587e9230a066b70fb55d9f58256db509cc95a3b31d349f860f510
-
Filesize
39KB
MD5fe6b23186c2d77f7612bf7b1018a9b2a
SHA11528ec7633e998f040d2d4c37ac8a7dc87f99817
SHA25603bbe1a39c6716f07703d20ed7539d8bf13b87870c2c83ddda5445c82953a80a
SHA51240c9c9f3607cab24655593fc4766829516de33f13060be09f5ee65578824ac600cc1c07fe71cdd48bff7f52b447ff37c0d161d755a69ac7db7df118da6db7649
-
Filesize
33KB
MD56f86b79dbf15e810331df2ca77f1043a
SHA1875ed8498c21f396cc96b638911c23858ece5b88
SHA256f0f9dd1a9f164f4d2e73b4d23cc5742da2c39549b9c4db692283839c5313e04f
SHA512ca233a6bf55e253ebf1e8180a326667438e1124f6559054b87021095ef16ffc6b0c87361e0922087be4ca9cabd10828be3b6cc12c4032cb7f2a317fdbd76f818
-
Filesize
32KB
MD5e87ad0b3bf73f3e76500f28e195f7dc0
SHA1716b842f6fbf6c68dc9c4e599c8182bfbb1354dc
SHA25643b351419b73ac266c4b056a9c3a92f6dfa654328163814d17833a837577c070
SHA512d3ea8655d42a2b0938c2189ceeab25c29939c302c2e2205e05d6059afc2a9b2039b21c083a7c17da1ce5eebdc934ff327a452034e2e715e497bcd6239395774c
-
Filesize
39KB
MD51290be72ed991a3a800a6b2a124073b2
SHA1dac09f9f2ccb3b273893b653f822e3dfc556d498
SHA2566ba9a2e4a6a58f5bb792947990e51babd9d5151a7057e1a051cb007fea2eb41c
SHA512c0b8b4421fcb2aabe2c8c8773fd03842e3523bf2b75d6262fd8bd952adc12c06541bdae0219e89f9f9f8d79567a4fe4dff99529366c4a7c5bf66c218431f3217
-
Filesize
30KB
MD5150b5c3d1b452dccbe8f1313fda1b18c
SHA17128b6b9e84d69c415808f1d325dd969b17914cc
SHA2566d4eb9dca1cbcd3c2b39a993133731750b9fdf5988411f4a6da143b9204c01f2
SHA512a45a1f4f19a27558e08939c7f63894ff5754e6840db86b8c8c68d400a36fb23179caff164d8b839898321030469b56446b5a8efc5765096dee5e8a746351e949
-
Filesize
39KB
MD505a95593c61c744759e52caf5e13502e
SHA10054833d8a7a395a832e4c188c4d012301dd4090
SHA2561a3e5e49da88393a71ea00d73fee7570e40edb816b72622e39c7fcd09c95ead1
SHA51200aee4c02f9d6374560f7d2b826503aab332e1c4bc3203f88fe82e905471ec43f92f4af4fc52e46f377e4d297c2be99daf94980df2ce7664c169552800264fd3
-
Filesize
15KB
MD5cd131d41791a543cc6f6ed1ea5bd257c
SHA1f42a2708a0b42a13530d26515274d1fcdbfe8490
SHA256e139af8858fe90127095ac1c4685bcd849437ef0df7c416033554703f5d864bb
SHA512a6ee9af8f8c2c7acd58dd3c42b8d70c55202b382ffc5a93772af7bf7d7740c1162bb6d38a4307b1802294a18eb52032d410e128072af7d4f9d54f415be020c9a
-
Filesize
9KB
MD503e01a43300d94a371458e14d5e41781
SHA1c5ac3cd50fae588ff1c258edae864040a200653c
SHA25619de712560e5a25c5d67348996e7d4f95e8e3db6843086f52cb7209f2098200a
SHA512e271d52264ff979ae429a4053c945d7e7288f41e9fc6c64309f0ab805cec166c825c2273073c4ef9ca5ab33f00802457b17df103a06cbc35c54642d146571bbb
-
Filesize
788KB
MD584c1daf5f30ff99895ecab3a55354bcf
SHA17e25ba36bcc7deed89f3c9568016ddb3156c9c5a
SHA2567a0d281fa802d615ea1207bd2e9ebb98f3b74f9833bba3cb964ba7c7e0fb67fd
SHA512e4fb7e4d39f094463fdcdc4895ab2ea500eb51a32b6909cec80a526bbf34d5c0eb98f47ee256c0f0865bf3169374937f047bf5c4d6762779c8ca3332b4103be3
-
Filesize
288KB
MD5eb881e3dddc84b20bd92abcec444455f
SHA1e2c32b1c86d4f70e39de65e9ebc4f361b24ff4a1
SHA25611565d97287c01d22ad2e46c78d8a822fa3e6524561d4c02dfc87e8d346c44e7
SHA5125750cec73b36a3f19bfb055f880f3b6498a7ae589017333f6272d26f1c72c6f475a3308826268a098372bbb096b43fbd1e06e93eecc0a81046668228bc179a75
-
Filesize
29KB
MD52fadd9e618eff8175f2a6e8b95c0cacc
SHA19ab1710a217d15b192188b19467932d947b0a4f8
SHA256222211e8f512edf97d78bc93e1f271c922d5e91fa899e092b4a096776a704093
SHA512a3a934a8572ff9208d38cf381649bd83de227c44b735489fd2a9dc5a636ead9bb62459c9460ee53f61f0587a494877cd3a3c2611997be563f3137f8236ffc4ca
-
Filesize
13KB
MD5332adf643747297b9bfa9527eaefe084
SHA1670f933d778eca39938a515a39106551185205e9
SHA256e49545feeae22198728ad04236e31e02035af7cc4d68e10cbecffd08669cbeca
SHA512bea95ce35c4c37b4b2e36cc1e81fc297cc4a8e17b93f10423a02b015ddb593064541b5eb7003560fbeee512ed52869a113a6fb439c1133af01f884a0db0344b0
-
Filesize
35KB
MD5812f8d2e53f076366fa3a214bb4cf558
SHA135ae734cfb99bb139906b5f4e8efbf950762f6f0
SHA2560d36a884a8381778bea71f5f9f0fc60cacadebd3f814679cb13414b8e7dbc283
SHA5121dcc3ef8c390ca49fbcd50c02accd8cc5700db3594428e2129f79feb81e4cbbeef1b4a10628b2cd66edf31a69ed39ca2f4e252ad8aa13d2f793fca5b9a1eaf23
-
Filesize
1KB
MD57e55ddc6d611176e697d01c90a1212cf
SHA1e2620da05b8e4e2360da579a7be32c1b225deb1b
SHA256ff542e32330b123486797b410621e19eafb39df3997e14701afa4c22096520ed
SHA512283d381aa396820b7e15768b20099d67688da1f6315ec9f7938c2fcc3167777502cded0d1beddf015a34cc4e5d045bcb665ffd28ba2fbb6faf50fdd38b31d16e
-
Filesize
1KB
MD57d62e82d960a938c98da02b1d5201bd5
SHA1194e96b0440bf8631887e5e9d3cc485f8e90fbf5
SHA256ae041c8764f56fd89277b34982145d16fc59a4754d261c861b19371c3271c6e5
SHA512ab06b2605f0c1f6b71ef69563c0c977d06c6ea84d58ef7f2baecba566d6037d1458c2b58e6bfd70ddef47dccbdea6d9c2f2e46dea67ea9e92457f754d7042f67
-
Filesize
35KB
MD53d25d679e0ff0b8c94273dcd8b07049d
SHA1a517fc5e96bc68a02a44093673ee7e076ad57308
SHA256288e9ad8f0201e45bc187839f15aca79d6b9f76a7d3c9274c80f5d4a4c219c0f
SHA5123bde668004ca7e28390862d0ae9903c756c16255bdbb3f7e73a5b093ce6a57a3165d6797b0a643b254493149231aca7f7f03e0af15a0cbe28aff02f0071ec255
-
Filesize
9KB
MD55dfa8d3abcf4962d9ec41cfc7c0f75e3
SHA14196b0878c6c66b6fa260ab765a0e79f7aec0d24
SHA256b499e1b21091b539d4906e45b6fdf490d5445256b72871aece2f5b2562c11793
SHA51269a13d4348384f134ba93c9a846c6760b342e3a7a2e9df9c7062088105ac0b77b8a524f179efb1724c0ce168e01ba8bb46f2d6fae39cabe32cab9a34fc293e4a