Resubmissions

21-05-2024 14:59

240521-sc4wsahh6x 8

11-05-2024 22:03

240511-1yessadh68 10

Analysis

  • max time kernel
    121s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2024 14:59

General

  • Target

    LDPlayer9_ens_31815734_ld.exe

  • Size

    3.3MB

  • MD5

    7c2e5ef59e9589422bcd5bf3726fbcb1

  • SHA1

    c4dac6966ac4cd3500d6a7fe44138a0db639d507

  • SHA256

    6870e8dbcfaf543500add1d303de528c34e3b1f4d4424b0097c4ffb408a44fcd

  • SHA512

    28870d9cb07f964ba0ecedfb25762cb4530bda869cc717dd4fffcd176085f03c05fd129b23e826dd6ac33ae6af8132bf9dc317ebffb52448b83236ad2349ca45

  • SSDEEP

    49152:XZi5hu7I/BzfK/ZHg1pHtOUYqP3CFOrtG/RR9sXafgkDFMVR9C1UhPJXMK701hOw:XI5ht/BzfKW1t0xOouBiCV2Ht

Score
6/10

Malware Config

Signatures

  • Checks for any installed AV software in registry 1 TTPs 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LDPlayer9_ens_31815734_ld.exe
    "C:\Users\Admin\AppData\Local\Temp\LDPlayer9_ens_31815734_ld.exe"
    1⤵
    • Checks for any installed AV software in registry
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2900
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://encdn.ldmnq.com/download/package/LDPlayer9.0.exe
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1580
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1580 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    50f1a66a5596a4bddb092a400730e0e1

    SHA1

    6437db4dd730b1aed7cd2708bfb495363d46e8b1

    SHA256

    91fcc39665af37199979681e6de8a77835a432b13e667c95b305d8c53e9b127a

    SHA512

    4caa73eb7ff996af59ca6267ef18932dd5f97b002b215eb199d0980ab4af3c489572dc3c289ffcf8b66fcc90b0e88d676985b30516aa34912965ab943d753672

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    496789a444127e3f6586c48bfd4e83eb

    SHA1

    dedf13fb0216d13e077e9b917f19f43c3640b15d

    SHA256

    07bb30ad95f29fc9fbc2169dcaac13cd533cfafeaee17b82b0efa14b337d6631

    SHA512

    00a6ecbdca6c75613a7f38cc5c0495147740b0d33aac8e77c3847b64feac1a7a1143ac44c82be988caa1d94beb4324c0bb0975418fcced44cf67db874e6acd9c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    173963248404a8fed025d048ad19400c

    SHA1

    9845b95e2450919dd75831c5613ab37828c295d6

    SHA256

    0c4d3bb2e5429b5e0e8b20a0aec7e53a24980aae2876af2836196c092cd5108b

    SHA512

    ca810faff48ba2408fa3d84414bd54f5b09b6b1d38c12ea0a1c678662af9b4787b9b3b624b436d8411fca02d3de849cb2acb4cc75062720ad3c31a53fb778a5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    43a52d0dab1a79814cfbb93e63889c25

    SHA1

    1005589d22f1422fb1a7b9edbcc601d1cf669be6

    SHA256

    d416af83610fee78f7d9a365e544b556e0474ac0ae75bb8bbaa903fd50186888

    SHA512

    1a9f26f3b2da4ba0dc314c3bdf47065156b9744e40c1038c914afab0d86223c6ff2bb64fa5c43835037f43825892993d678f162f84b5f925ccf511058cbe056e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e8580f0920f5197ef5097912b3005b94

    SHA1

    40c9227d9f8095422a68e35710a2bf0b3d0d60d1

    SHA256

    31197f92054d9efe25cf23e408444c12381fee02fa259f8f3360a320f2ce3279

    SHA512

    ce600ea9a235a75071372d3d40610e8bdfc766bdbdbc47b01174ba382e6ad66081abb9ea34a33f4d233ff328101f9c1e5245471091151c62eff99c0ba017b8f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    382e66ab8408d1f63a60a3f78826bca3

    SHA1

    d6aae61efe37f67a5795a5d1cdc9e6ff2bfb3693

    SHA256

    d9b3ba8f36cadd81dce669bb0fc9ec16fef2deb4c29fbcb1f6b957982a9c0cf8

    SHA512

    f78bcd0a09a3e3216c40b6ee522696103633ac80dd265b9900a8f5044d3ea0a5b70d4c4968a4a39060a43f0ff3c167071e4fc661ebb8ddb3348ca52b18b6f86d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a521592f126ffc289e9204385247074d

    SHA1

    df604a583353838d326417f78b577642ac1f4dca

    SHA256

    5d29ef4838f25de99ee46007709af6f391a0e4fdf1aef495bf4dfba04fc2d19e

    SHA512

    574075337a7454732b3da6c731cf0645c8baaca2df0e8f39a402c8fd84529db0ffb1b671c5aed8c3e017fb8c2773755680799b8009ccbc7bb647164579e8c7b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8ff6235f7d90ec539021fc7d181d7d7d

    SHA1

    febaca62288bddf02d5464e2b6c394e5fbd98bd3

    SHA256

    66625154707c5e96be98944036d22c1ac339b7e52ce7b651e301506cdfb8e40a

    SHA512

    c1f29d2fdf64ade5783af2485d3d342e954013717773c81de0c778a8a8a068268668bbcfd4faf50a66cc3b8cf798e5f6bef855d06612bffba70576af5c97754a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    da69799f34525e78396137117ed7fe3d

    SHA1

    b2117af1a9a074522aa1ba9e7d4a251f5f0dd793

    SHA256

    b92158c4a1167ff34f228f931e8f2a4a77150332b5dd430d9824b9b0da7d5c73

    SHA512

    28f4a50b743147f8096170f7cb6ccf45c9c07fb62594edd86093b266b344e8871fd281f95a378d2017528a69bd4ca21e01aa01923786c46937d5ef9f52e3e0cf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1097c7a0bbdffb2a49e30ce39c61abf3

    SHA1

    7ff6f21d548c48634172f32d1dd8adf421841307

    SHA256

    3ad7a3c496c6713b7336e95439eb22edc4404a5dd696e9216ecc676aa1fb50ed

    SHA512

    f0c95745ece1bf5532c960eee8b447e48a5a0e9e45d86563aea4d66683c320e51f74dae4cd363b1163d55e30fc600939f4ebe8b78af73553c57a3ba4bcc09041

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    99e5eb1dae7667adc6f2826ddf315ecd

    SHA1

    a3c6a498433ee312ff8d702a59bd6edf45747e23

    SHA256

    c63f5e646fcab0971581643fe4659ae2fbb64d74cab0cdd2ed9fb582641f699b

    SHA512

    f567ce8f32fe270606e91d1d276cef376560fa83b68ea81c6372524384befaeae3d5da883e64ca85aec2f667638ca6b813838f123f5167f403754d189d7e6157

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a284b5bdb811b1e400b6d4cabefff8e2

    SHA1

    865b4f04fb9fb054ef2b9d982100ea503ca12db4

    SHA256

    40d42a6fbae19474352ccff26844b72822625ad43549ecde0f59f81610b64052

    SHA512

    f5478740b919550b152a30cd6d025f62ac6d42f2ea768e182a6faa15c616347eac80539e592e7fe346a0d924f9536cd5972ecc8c64e22e981759ee534fbbbe1c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bbce15d17d6d43469b0d8b1aea8ba21c

    SHA1

    52048c68839049fc64397f3addd81297f89eb58d

    SHA256

    849168637a0952b84c624c9171bfb537924c1ac87eb132f8468bd14461f22917

    SHA512

    38c28a1afd6a772ebc7359ea2df1f57d21ee4f07387428c760c8ad60fa27a8678a526bee61ed60cffb1eb51aeced2b6ab83f702c2ce69d8eaf34bf5e59ee7a6f

  • C:\Users\Admin\AppData\Local\Temp\Cab208D.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar20AF.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • \Users\Admin\AppData\Local\Temp\Setup\ds.dll

    Filesize

    67KB

    MD5

    7d5d3e2fcfa5ff53f5ae075ed4327b18

    SHA1

    3905104d8f7ba88b3b34f4997f3948b3183953f6

    SHA256

    e1fb95609f2757ce74cb531a5cf59674e411ea0a262b758371d7236c191910c4

    SHA512

    e67683331bb32ea4b2c38405be7f516db6935f883a1e4ae02a1700f5f36462c31b593e07c6fe06d8c0cb1c20c9f40a507c9eae245667c89f989e32765a89f589

  • memory/2900-137-0x0000000003690000-0x00000000036D0000-memory.dmp

    Filesize

    256KB

  • memory/2900-11-0x0000000003690000-0x00000000036D0000-memory.dmp

    Filesize

    256KB

  • memory/2900-12-0x0000000073EFE000-0x0000000073EFF000-memory.dmp

    Filesize

    4KB

  • memory/2900-16-0x0000000002C90000-0x0000000002CA4000-memory.dmp

    Filesize

    80KB

  • memory/2900-17-0x00000000746B0000-0x00000000746C4000-memory.dmp

    Filesize

    80KB

  • memory/2900-130-0x0000000073EF0000-0x00000000745DE000-memory.dmp

    Filesize

    6.9MB

  • memory/2900-571-0x0000000073EFE000-0x0000000073EFF000-memory.dmp

    Filesize

    4KB

  • memory/2900-572-0x0000000073EF0000-0x00000000745DE000-memory.dmp

    Filesize

    6.9MB

  • memory/2900-129-0x0000000073EF0000-0x00000000745DE000-memory.dmp

    Filesize

    6.9MB

  • memory/2900-128-0x0000000003620000-0x0000000003664000-memory.dmp

    Filesize

    272KB