Overview
overview
9Static
static
7l2text/ser...lp.htm
windows7-x64
1l2text/ser...lp.htm
windows10-2004-x64
1system/ALAudio.dll
windows7-x64
7system/ALAudio.dll
windows10-2004-x64
7system/Core.dll
windows7-x64
3system/Core.dll
windows10-2004-x64
3system/D3DDrv.dll
windows7-x64
7system/D3DDrv.dll
windows10-2004-x64
7system/Fire.dll
windows7-x64
7system/Fire.dll
windows10-2004-x64
7system/GameGuard.exe
windows7-x64
1system/GameGuard.exe
windows10-2004-x64
1system/IpDrv.dll
windows7-x64
7system/IpDrv.dll
windows10-2004-x64
7system/NWindow.dll
windows7-x64
7system/NWindow.dll
windows10-2004-x64
7system/WinDrv.dll
windows7-x64
7system/WinDrv.dll
windows10-2004-x64
7system/Window.dll
windows7-x64
7system/Window.dll
windows10-2004-x64
7system/def...32.dll
windows7-x64
1system/def...32.dll
windows10-2004-x64
3system/dsetup.dll
windows7-x64
9system/dsetup.dll
windows10-2004-x64
9system/encvag.dll
windows7-x64
1system/encvag.dll
windows10-2004-x64
1system/engine.dll
windows7-x64
7system/engine.dll
windows10-2004-x64
7system/ifc23.dll
windows7-x64
3system/ifc23.dll
windows10-2004-x64
3system/l2.exe
windows7-x64
9system/l2.exe
windows10-2004-x64
7Analysis
-
max time kernel
0s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 20:34
Behavioral task
behavioral1
Sample
l2text/server_help.htm
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
l2text/server_help.htm
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
system/ALAudio.dll
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
system/ALAudio.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
system/Core.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
system/Core.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
system/D3DDrv.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
system/D3DDrv.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
system/Fire.dll
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
system/Fire.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
system/GameGuard.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
system/GameGuard.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
system/IpDrv.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
system/IpDrv.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
system/NWindow.dll
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
system/NWindow.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
system/WinDrv.dll
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
system/WinDrv.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
system/Window.dll
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
system/Window.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
system/defopenal32.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
system/defopenal32.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
system/dsetup.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
system/dsetup.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
system/encvag.dll
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
system/encvag.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
system/engine.dll
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
system/engine.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
system/ifc23.dll
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
system/ifc23.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
system/l2.exe
Resource
win7-20240611-en
General
-
Target
l2text/server_help.htm
-
Size
1008B
-
MD5
8ca4068d7cf9bf1e6cecaf7236b06df6
-
SHA1
810f62ae006d5f5f6c187a285322ae42b2c9e027
-
SHA256
3364475c70b49af969e0611c88bf02e204582b5bbef8835ebc42783e54749efb
-
SHA512
e5ccbe4e45bac2cbf74705ce7c8b449aff158041b1dcbbd3fd38d7f0dae5b1a6791c9c7308a0cae7f57cfbb98e6508753389dcc8ea7d0d7189929f32e70b858b
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 3124 wrote to memory of 5056 3124 msedge.exe 80 PID 3124 wrote to memory of 5056 3124 msedge.exe 80 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 5072 3124 msedge.exe 81 PID 3124 wrote to memory of 2948 3124 msedge.exe 82 PID 3124 wrote to memory of 2948 3124 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\l2text\server_help.htm1⤵
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7fff488146f8,0x7fff48814708,0x7fff488147182⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,11418686381116577185,15530782046776029043,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,11418686381116577185,15530782046776029043,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,11418686381116577185,15530782046776029043,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11418686381116577185,15530782046776029043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11418686381116577185,15530782046776029043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,11418686381116577185,15530782046776029043,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4936 /prefetch:82⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,11418686381116577185,15530782046776029043,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4936 /prefetch:82⤵PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11418686381116577185,15530782046776029043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11418686381116577185,15530782046776029043,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11418686381116577185,15530782046776029043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11418686381116577185,15530782046776029043,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,11418686381116577185,15530782046776029043,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1976 /prefetch:22⤵PID:3740
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:836
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4876
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\8d797dea-cbff-47ff-86f3-41315e8c3695.tmp
Filesize6KB
MD511948a88467d8f75724be3533353c4c1
SHA124f735a1d51ca6088629e4c3bd38a4225382eb4d
SHA256f19c905fce4150d78a2afb60b62af1e87d0f33da0bad43f5e17b4212ef7ea337
SHA5120d1ad11dc6c0aef82d6f9a86648edcc7b8cc0f40e5dc511e5c9fa5a2fe36dd0c9ee9bbb6cf6e20524d37d1c58a4e21dc2ffc1deecda40225d37310e6d8c57e7d
-
Filesize
5KB
MD5d51e6dfb8d132fae0479129b972851a0
SHA1f43d52c6c3d34e8153a7a91f085be22ace98f46e
SHA256b4a0d3affa73ccd892ae67bf65bc9042b132aa69f21d7bed4d439db5a6568f7e
SHA512bb3eabef387b667b6b5ae5c749967b117264d4b568f4562b5b6f1234797956420e204aeb5d06841eb06323ac391fb00dcea407af853b7fceb47de3527c7236a3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD569b46bae431dcf6e6f135e730d8d5401
SHA1be74c502f5d6c8cc5152d9aa71f58589334c103b
SHA256edbafbf4aa0577b4c719ecc1135d44057ccb1e858503d6f3d211813fff851a47
SHA5123eac8c05bfb9ba11a2026b469e92a03bc2e89d54d7c6b3b6fee999d545885581a523e12c8acea0a4b61e7ad43fa8edfc48630853cb71439cddae3cc9cf8c2193