Analysis

  • max time kernel
    125s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-06-2024 20:37

General

  • Target

    Haxball-Setup-0.3.4.exe

  • Size

    51.8MB

  • MD5

    98c2c1a926209520eda30f9c39b0d9e1

  • SHA1

    697e61e4105fbfa4f77f2f4f438c70f0f4756fb0

  • SHA256

    3619af438c00c13f87a34406bd379081817a7dd8b2fcd880e6c88c1ec93d7f1c

  • SHA512

    39895e2fa79865ce7b21aee31fe5a16f1235eac2cbb1a0eabfc5cc2166d2406a52961321026752279e965ace51138595fcda4a411580f6d703d2ee256fdb60d3

  • SSDEEP

    1572864:CqqSChgYfRrRd7QSkIVeWM43GuTTwHsnL5Z:CqH0prRpQQXM47TsMnT

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 18 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 22 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Haxball-Setup-0.3.4.exe
    "C:\Users\Admin\AppData\Local\Temp\Haxball-Setup-0.3.4.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3788
  • C:\Users\Admin\AppData\Local\Programs\haxball-application\Haxball.exe
    "C:\Users\Admin\AppData\Local\Programs\haxball-application\Haxball.exe"
    1⤵
    • Checks computer location settings
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1412
    • C:\Users\Admin\AppData\Local\Programs\haxball-application\Haxball.exe
      "C:\Users\Admin\AppData\Local\Programs\haxball-application\Haxball.exe" --type=gpu-process --field-trial-handle=1568,800141600019537285,10821485208478800987,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1596 /prefetch:2
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:312
    • C:\Users\Admin\AppData\Local\Programs\haxball-application\Haxball.exe
      "C:\Users\Admin\AppData\Local\Programs\haxball-application\Haxball.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1568,800141600019537285,10821485208478800987,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2332 /prefetch:8
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      PID:1904
    • C:\Users\Admin\AppData\Local\Programs\haxball-application\Haxball.exe
      "C:\Users\Admin\AppData\Local\Programs\haxball-application\Haxball.exe" --type=renderer --field-trial-handle=1568,800141600019537285,10821485208478800987,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --app-path="C:\Users\Admin\AppData\Local\Programs\haxball-application\resources\app.asar" --no-sandbox --no-zygote --background-color=#fff --enable-spellcheck --enable-websql --disable-electron-site-instance-overrides --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=3 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2512 /prefetch:1
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      PID:2124
    • C:\Users\Admin\AppData\Local\Programs\haxball-application\Haxball.exe
      "C:\Users\Admin\AppData\Local\Programs\haxball-application\Haxball.exe" --type=renderer --field-trial-handle=1568,800141600019537285,10821485208478800987,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --app-path="C:\Users\Admin\AppData\Local\Programs\haxball-application\resources\app.asar" --node-integration --no-sandbox --no-zygote --background-color=#fff --enable-spellcheck --enable-websql --disable-electron-site-instance-overrides --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2888 /prefetch:1
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      PID:816
    • C:\Users\Admin\AppData\Local\Programs\haxball-application\Haxball.exe
      "C:\Users\Admin\AppData\Local\Programs\haxball-application\Haxball.exe" --type=gpu-process --field-trial-handle=1568,800141600019537285,10821485208478800987,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=MAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAIAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=2916 /prefetch:2
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      PID:3772
  • C:\Windows\System32\CompPkgSrv.exe
    C:\Windows\System32\CompPkgSrv.exe -Embedding
    1⤵
      PID:4624

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Programs\haxball-application\D3DCompiler_47.dll

      Filesize

      3.5MB

      MD5

      2f2e363c9a9baa0a9626db374cc4e8a4

      SHA1

      17f405e81e5fce4c5a02ca049f7bd48b31674c8f

      SHA256

      2630f4188bd2ea5451ca61d83869bf7068a4f0440401c949a9feb9fb476e15df

      SHA512

      e668a5d1f5e6f821ebfa0913e201f0dfd8da2f96605701f8db18d14ea4fdeac73aeb9b4fe1f22eaeffcdd1c0f73a6701763727d5b09775666f82b678404e4924

    • C:\Users\Admin\AppData\Local\Programs\haxball-application\chrome_100_percent.pak

      Filesize

      176KB

      MD5

      d5719b1f791ac999c3cfda2e4405bdce

      SHA1

      c5d94054bcb271dee08714c313476abd67be28ca

      SHA256

      7cb9d93a16e5621ab765e3f3b459f4698ae496035e283f2c0c390b188a487741

      SHA512

      ce75bde78ddf6bc394662c5d0ce107ba375b13bf75a31ba1888dffa74900fa86babd65ce222c38db73a11c8d54b3c6f6046b8f71ce80281eec884fd7f0cd1583

    • C:\Users\Admin\AppData\Local\Programs\haxball-application\chrome_200_percent.pak

      Filesize

      313KB

      MD5

      0649df49260e18326c9a54545131aaec

      SHA1

      76de40e3b828cb42cb8b9beb31808ea2145eda56

      SHA256

      070a6cb68318a032ec17cd7b07f8af8bd6983f16997f50a231d232396a2f570f

      SHA512

      c196726564ea218c1e58121f43ab6f138a676a47cd53ad9099daec4cc3a491cf7f9127c56f31f8ec460080ba5f2f56eb2f6c7d37e286e05c4dbd9592552185d4

    • C:\Users\Admin\AppData\Local\Programs\haxball-application\ffmpeg.dll

      Filesize

      2.5MB

      MD5

      db7974db8af148508cab4ce2017e8b1f

      SHA1

      48c81f39f0e2223aa0b110a3474bd8d0213d8760

      SHA256

      2f1d4a76994c2defd144ff1f2e7c64b8bd028d197994403b135f97657410980a

      SHA512

      2450420be11ed84fb2a533128475d51e83573085e8f4de43ff9390bfde08ae9f7e35a19079bb8d085d9f55d9e32ecfe6bd2695760e46f3363a210a6292cc938f

    • C:\Users\Admin\AppData\Local\Programs\haxball-application\icudtl.dat

      Filesize

      10.0MB

      MD5

      9732e28c054db1e042cd306a7bc9227a

      SHA1

      6bab2e77925515888808c1ef729c5bb1323100dd

      SHA256

      27993e2079711d5f0f04a72f48fee88b269604c8e3fbdf50a7f7bb3f5bfc8d8e

      SHA512

      3eb67ab896a56dab4a2d6eea98f251affd6864c5f5b24f22b61b6acc1df4460d86f0a448f1983aac019e79ff930286c3510891be9d48ef07a93ff975a0e55335

    • C:\Users\Admin\AppData\Local\Programs\haxball-application\libEGL.dll

      Filesize

      348KB

      MD5

      985125118e135a027cf98c189281fccc

      SHA1

      5eac86608875e127810b02122c5a7d8aa258c233

      SHA256

      f156ca816c7bcfef973b16c745afb472173366f9eef015176ac3c5d6cb698639

      SHA512

      439591c75f909a633f8534bfca39b2ec9c20e181b6fcca2a927dde2108d3d8317732369cfe04c1296b43dd3f60a0c191947ecfc5da33586c63a03b932e8fe614

    • C:\Users\Admin\AppData\Local\Programs\haxball-application\libglesv2.dll

      Filesize

      8.0MB

      MD5

      858ef7e52143fa10ac2ae622f8dce4de

      SHA1

      c98296693133006b8e386544e1fe96681558fce2

      SHA256

      af8915450edb35401433e8c70a6e6f04b734f297662b2a4f419b10e2f8f616f7

      SHA512

      692712ff5478f760cea32d404a3dbd7dc20c5d50c8b4946bf62083335727dbf87a24056e393099733f6d1b005dbb9f6d06e36aa84d1d8e6378c4f33de8ff6693

    • C:\Users\Admin\AppData\Local\Programs\haxball-application\locales\en-US.pak

      Filesize

      80KB

      MD5

      69d7c5168de6b4311a36c39ca7ca60f0

      SHA1

      40ff72437b51677065d68a6486e3b03e0a27102d

      SHA256

      fdeb2723f423dfe7ee4c19cc052398cbe796bfce7d432d0abe4ea40e6c6e3dab

      SHA512

      4e1fd01bd7d5f65f8aa2f0b2f4845106df916a53dd4898d0cec7fc538c2908d22f4ffd3dacf023c7854f4854534468a9bc93763be21075661501c6ceca2ca0e7

    • C:\Users\Admin\AppData\Local\Programs\haxball-application\resources.pak

      Filesize

      4.1MB

      MD5

      977bdf44c3bd2fa5ece6f23915a7acc6

      SHA1

      df371edc31eb80fe0899447deac2921f519c8cc5

      SHA256

      2fe8dd43b377a908df6454ec3005b3e25409a82bfb45c35ba871f05cc578c21e

      SHA512

      d437bcc48bec3ad66a5cd0e6d6c3948276b897f6eca034b3c221ea1dc00fe7b27425d1491a1634b6ac843fc1f12aecd20bf2a7da5fe8023aac824adc0f791639

    • C:\Users\Admin\AppData\Local\Programs\haxball-application\resources\app.asar

      Filesize

      11.7MB

      MD5

      5c311655241d37b440d5257b0893624e

      SHA1

      a0b88d1190dfd04803f283f45e2c5668298bdc02

      SHA256

      aefe5bc054e0adc08616d93ed0266afe06a02c798597580be9a8226ba09c9ff0

      SHA512

      d8c27ab13ce6564dbf22d55c27d7609a6e0e1b4ec8b9a61970ff3c2b062e810f5efffff3c2896d3d23605df23453a2a7ee62439a177c7d5b30f06a5c6ca48cf5

    • C:\Users\Admin\AppData\Local\Programs\haxball-application\v8_context_snapshot.bin

      Filesize

      167KB

      MD5

      d644bba1542afa11fdda21a6d02b9aec

      SHA1

      310be26945e2c86a2728c94465ef8356004d2155

      SHA256

      02bab4d0fb593602ddbd74f494fd6376456bbde8f3940f155c5db57e263c0835

      SHA512

      f5c01316de5a8ae6994b908fee79714f46d550fcf1c082abf4d8c353103a1bf2f32808a54ca8d4355cd071541dcafe352631d39ba652d3ac72a930b02e232d4e

    • C:\Users\Admin\AppData\Local\Temp\e3245ccc-0e87-4584-9374-4fffe7b8fbcf.tmp.ico

      Filesize

      178KB

      MD5

      7da44d4d6642438a8a9af46b6613bcb4

      SHA1

      e2dadcf9899d1e9e200f4981e731b14e0d379bfc

      SHA256

      5f33d7499caeef8d7d801356f5b9faf8b0b1ffe0c2fa6e95aeba22f7f30b07b5

      SHA512

      cbe16fd36c567158aa5aa55c520a4522c94b42913ff02597ba1c2e4585b57adbb6e7b67528f3029e91b9152f5b08d69ef7415189d4f9d7659eb3fa02e078e12b

    • C:\Users\Admin\AppData\Local\Temp\nsd4FD6.tmp\SpiderBanner.dll

      Filesize

      9KB

      MD5

      17309e33b596ba3a5693b4d3e85cf8d7

      SHA1

      7d361836cf53df42021c7f2b148aec9458818c01

      SHA256

      996a259e53ca18b89ec36d038c40148957c978c0fd600a268497d4c92f882a93

      SHA512

      1abac3ce4f2d5e4a635162e16cf9125e059ba1539f70086c2d71cd00d41a6e2a54d468e6f37792e55a822d7082fb388b8dfecc79b59226bbb047b7d28d44d298

    • C:\Users\Admin\AppData\Local\Temp\nsd4FD6.tmp\StdUtils.dll

      Filesize

      100KB

      MD5

      c6a6e03f77c313b267498515488c5740

      SHA1

      3d49fc2784b9450962ed6b82b46e9c3c957d7c15

      SHA256

      b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e

      SHA512

      9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803

    • C:\Users\Admin\AppData\Local\Temp\nsd4FD6.tmp\System.dll

      Filesize

      12KB

      MD5

      0d7ad4f45dc6f5aa87f606d0331c6901

      SHA1

      48df0911f0484cbe2a8cdd5362140b63c41ee457

      SHA256

      3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca

      SHA512

      c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9

    • C:\Users\Admin\AppData\Local\Temp\nsd4FD6.tmp\WinShell.dll

      Filesize

      3KB

      MD5

      1cc7c37b7e0c8cd8bf04b6cc283e1e56

      SHA1

      0b9519763be6625bd5abce175dcc59c96d100d4c

      SHA256

      9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6

      SHA512

      7acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f

    • C:\Users\Admin\AppData\Local\Temp\nsd4FD6.tmp\nsProcess.dll

      Filesize

      4KB

      MD5

      f0438a894f3a7e01a4aae8d1b5dd0289

      SHA1

      b058e3fcfb7b550041da16bf10d8837024c38bf6

      SHA256

      30c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11

      SHA512

      f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7

    • C:\Users\Admin\AppData\Local\Temp\nsd4FD6.tmp\nsis7z.dll

      Filesize

      424KB

      MD5

      80e44ce4895304c6a3a831310fbf8cd0

      SHA1

      36bd49ae21c460be5753a904b4501f1abca53508

      SHA256

      b393f05e8ff919ef071181050e1873c9a776e1a0ae8329aefff7007d0cadf592

      SHA512

      c8ba7b1f9113ead23e993e74a48c4427ae3562c1f6d9910b2bbe6806c9107cf7d94bc7d204613e4743d0cd869e00dafd4fb54aad1e8adb69c553f3b9e5bc64df

    • C:\Users\Admin\AppData\Roaming\haxball-application\Cache\f_000004

      Filesize

      100KB

      MD5

      f134fda98a277b1c8f20ab8fbe2fbd58

      SHA1

      a922796190a1f5bbb3c410c6ec591502050df04e

      SHA256

      27bce9e85eaf3567a4695ba2b612e32615394d80d0a3a2dcb07b1fbfdfababc7

      SHA512

      2b2e8338afb9b0ca9b5fa3d452dfd80368b5d17566120ae6351b6d03572e5a69cedb97f165fbc31ffb3addcc00506a3fc0761cf2404a5d9826a8448a7c4d9f17

    • C:\Users\Admin\AppData\Roaming\haxball-application\Code Cache\js\index-dir\the-real-index

      Filesize

      48B

      MD5

      5ae94b7f8fa558a634bf5bc9d97b0e77

      SHA1

      01a4244fb25f21d21315193d25411b5aaf0afe47

      SHA256

      00364ab6df8d7f42db0c651a3bff0ad72d25a8f29257cc10902697ca070586d9

      SHA512

      ffa147a8d2f7e08d5e513157b4d330d0e0658c6fb827320ff87168d67485736331f0562e8321cf34bbe3943f4f39d4338b162580492e49316e8a0aec91ca7152

    • C:\Users\Admin\AppData\Roaming\haxball-application\Code Cache\js\index-dir\the-real-index

      Filesize

      72B

      MD5

      a3889233297cb2fe2b769968621a6050

      SHA1

      0a8c0cd29ad873e4569b0af81d4c9fab25ae573e

      SHA256

      7262182fbf5044658f162bfa15f0d19c789bd47d619fecc7259bf6bea54d01f9

      SHA512

      f93148eecc2592dbf3ae475e7fb8df9125a55f488bcbb009b3720044d44762b57ed158143e9ad4fe5cdd07a741e964cb2cbb4c9b45fb8d7d2bc397687abb06c6

    • C:\Users\Admin\AppData\Roaming\haxball-application\Network Persistent State

      Filesize

      1KB

      MD5

      d1122a4297f843cbdfbfebcec1fec493

      SHA1

      9f0bd28ebdf7b2e5a6f02badafcc189c47d69f88

      SHA256

      b99626a3a2207372d442169396393bcb7a8ce6e636890765c2311b34c740b59c

      SHA512

      d1d9b59731bb0a3936f76db19903b4c81e0fdfc61c3cc4cacb831baa14e6fcf567f7c39513b0c5de24fc3640bc3b597d4d870584135e22b3d9b540a7ce463290

    • C:\Users\Admin\AppData\Roaming\haxball-application\Network Persistent State~RFe5879af.TMP

      Filesize

      59B

      MD5

      2800881c775077e1c4b6e06bf4676de4

      SHA1

      2873631068c8b3b9495638c865915be822442c8b

      SHA256

      226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

      SHA512

      e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

    • C:\Users\Admin\AppData\Roaming\haxball-application\Session Storage\CURRENT

      Filesize

      16B

      MD5

      46295cac801e5d4857d09837238a6394

      SHA1

      44e0fa1b517dbf802b18faf0785eeea6ac51594b

      SHA256

      0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

      SHA512

      8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

    • C:\Users\Admin\AppData\Roaming\haxball-application\TransportSecurity

      Filesize

      537B

      MD5

      42d310dd6e41a8130db076211f06d866

      SHA1

      d635e98782b710afe1ffc68f69486fb9949d428d

      SHA256

      c89c3505de1c0c20c805cd5aa19143cc6921a674c32c4fd31dcfff38fb3de46c

      SHA512

      40ecc7cb0878cee204da9f48273ada5facfa5227be55fa1f6dd03fbc9b1ad71dbfd598e108e48b0b32c823360c86a8618c3b6894fbfdc8656d85a7d6f91ee151

    • C:\Users\Admin\AppData\Roaming\haxball-application\TransportSecurity~RFe57bdb2.TMP

      Filesize

      370B

      MD5

      54ff48b6813d8f9a3f46fb694a4b764f

      SHA1

      aa05583d4792966c2997132e53408dcc3cc87baa

      SHA256

      b09e19c152d498882384780bd3561b7acdb897e1866bfdb47b9729de05618e8c

      SHA512

      48904973c576257fb66ef92e6fcc126860a27504f98219a01cba956641450d9b89a391247ce510a29d876641467ace4ca3b1391c3c52a53b275c3d68e946661a