Resubmissions

28-05-2024 10:29

240528-mjl2nafe8z 7

Analysis

  • max time kernel
    133s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    28-05-2024 10:29

General

  • Target

    DisneyClient.exe

  • Size

    112.3MB

  • MD5

    dfcfc279ead34abb76dc24d0f5a0fbfc

  • SHA1

    bde041a96ad64942543037136b84677b48381e93

  • SHA256

    15266b3ee806793d382388e564d30814ad9a257d1f213840f286838cb6b3a92c

  • SHA512

    1ac73fd15c228b31eb9231d117de148c45f4ae2c132a07ff57a3c58bff8a016f09076591a9941f81310f30e67898d85e1d3feb261d7e236293751fd0d9da56cf

  • SSDEEP

    1572864:XfJBvQqy7wCHw+DqgWucHRifbOsTzVv3V8qekx34mefgprI2wACmucb2M9keuUo2:hBvQbrzMqekphUnCFOec69

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DisneyClient.exe
    "C:\Users\Admin\AppData\Local\Temp\DisneyClient.exe"
    1⤵
    • Checks computer location settings
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Users\Admin\AppData\Local\Temp\DisneyClient.exe
      "C:\Users\Admin\AppData\Local\Temp\DisneyClient.exe" --type=gpu-process --field-trial-handle=1036,3777894978137857723,5839792060711137254,131072 --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=1060 /prefetch:2
      2⤵
        PID:2576
      • C:\Users\Admin\AppData\Local\Temp\DisneyClient.exe
        "C:\Users\Admin\AppData\Local\Temp\DisneyClient.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1036,3777894978137857723,5839792060711137254,131072 --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1312 /prefetch:8
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2496
      • C:\Users\Admin\AppData\Local\Temp\DisneyClient.exe
        "C:\Users\Admin\AppData\Local\Temp\DisneyClient.exe" --type=renderer --field-trial-handle=1036,3777894978137857723,5839792060711137254,131072 --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --disable-gpu-compositing --lang=en-US --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1576 /prefetch:1
        2⤵
        • Checks computer location settings
        • Suspicious behavior: EnumeratesProcesses
        PID:2544

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      348e9e00c2a5f49f5c8222ed1b043915

      SHA1

      ed8ba647b842d3c3c4b7824452cb199e816a6941

      SHA256

      e860f9f01ba9cb4699d811c59d0cb53c6734564f2a6ed919eb20da9c378eaa74

      SHA512

      65016f01655da30f43c1347be19b4fa714821fc4d17185595b913a7a9f321a966e5924f3cb0d0e48ae562a4c369442e41a63dabba73d62954a7705e95e1d7042

    • C:\Users\Admin\AppData\Local\Temp\Cab3B7C.tmp

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\Tar3B8F.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • memory/2576-0-0x0000000000EF0000-0x0000000000EF1000-memory.dmp

      Filesize

      4KB