Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04-07-2024 03:52
Static task
static1
Behavioral task
behavioral1
Sample
AmazonSetup.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
AmazonSetup.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
AmazonGamesSetup.exe
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
AmazonGamesSetup.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
LIXVoWXPPCyc5Jy.exe
Resource
win7-20240508-en
General
-
Target
AmazonGamesSetup.exe
-
Size
1.8MB
-
MD5
02be3726c0a90958a3c30577d3b3a131
-
SHA1
bedbab8bd74a9d7313ba32ca033c81ec32c04706
-
SHA256
1a99f1054e51fe86416c59e5c526d69776fdabd7bb9831dbaab8582322121c7a
-
SHA512
662eaa8d3b112ef981d27832a2a46b0ecb55e2d1dcf49fe1fbd134e3c4e02758bc9ad3db2e25f53fc174e2083dd278967f405a768fdd814612c9a43bc6d1c713
-
SSDEEP
49152:G/mvl+01HHWra6IjgKDlUzIzsBKLxYqJKevCnuueO+0D17gM8s:bvUAnWrBq1ABzH
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Executes dropped EXE 2 IoCs
pid Process 4372 Amazon Games Setup.exe 4220 Amazon Games.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4220 Amazon Games.exe 4220 Amazon Games.exe 4220 Amazon Games.exe 4220 Amazon Games.exe 4220 Amazon Games.exe 4220 Amazon Games.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1208 wrote to memory of 4372 1208 AmazonGamesSetup.exe 81 PID 1208 wrote to memory of 4372 1208 AmazonGamesSetup.exe 81 PID 1208 wrote to memory of 4372 1208 AmazonGamesSetup.exe 81 PID 4372 wrote to memory of 4220 4372 Amazon Games Setup.exe 91 PID 4372 wrote to memory of 4220 4372 Amazon Games Setup.exe 91 PID 4372 wrote to memory of 4220 4372 Amazon Games Setup.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\AmazonGamesSetup.exe"C:\Users\Admin\AppData\Local\Temp\AmazonGamesSetup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\Amazon Games Setup.exe"C:\Users\Admin\AppData\Local\Temp\Amazon Games Setup.exe" "/nopatch"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Users\Admin\AppData\Local\Amazon Games\App\Amazon Games.exe"C:\Users\Admin\AppData\Local\Amazon Games\App\Amazon Games.exe" " /channelId=87d38116-4cbf-4af0-a371-a5b498975346"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4220
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Amazon Games\App\Amazon Games UI\resources\static\public\core\auth-limbo-40b52b60a701b5c26a7d.css
Filesize320KB
MD5acf81f08b85de98eca96cc1b2bbb199a
SHA14c089f322370d4461ffa94097d39cc148f45c4da
SHA256e1326b0de115e4dae4d3157f50636abd85505c0995e4131d68878fedc512498e
SHA5129220c6162e604d05c404ea9868a3564b7691e51bf7535d1628d194d3fb7bd2391cae076e5da99f664632fc0c6acd7a0807fcb2d1b4af1e2842cfb6973e2e056b
-
Filesize
1.6MB
MD531c680c73261d867169c9859b0235fc4
SHA15a94d51dfe4c37acebc1b51d995ea1fcc8ab5f76
SHA256cd4de592833fb5bc3ff1897cecb02cd0b24b4db6b9b09649c444388ca4425921
SHA512d2f85d52108ee936743e5fc2e81a124d241b223bf4f10d10c807dc00146b537a757c9f6e5451b91f605b6245e4335544d4e1e80def515d219afb17794f41cb07
-
Filesize
1KB
MD53f399b5de2e03417f986d485d9ab6232
SHA1410b011a919ffa04479bc634cb72d2f1fa321c9e
SHA256bf9265a0f24424022691d89b4d5132f11d4e16e640674b913bebb24da29449cb
SHA512f443eb7ac9bd2491ad2be688d38e2a0a1f04f78a9aac365739b9352b8bde153f4dd0f4dd577654d58e9458265f620892108860c47730bdb0d0f391b510c44b5a
-
Filesize
701KB
MD56a209704d28c834d47daf7065ccce050
SHA158becf7b2a838b68d9e00d15ee997341349f9ce2
SHA25614781f848eacf9c5af40f08c9deab307818e7e9b2290957aab1008dbdefd59ec
SHA512d36191e83d55894e4b0c4b53e8f53f3ad68b0140736ef55aeb2477cf397b739308c7bc47f31d92e2b8bf28749f9662a5819fed1fd18ef5089dadf323d5a72934
-
Filesize
1.9MB
MD53f1a9950778e30d7e742506da20c0c14
SHA1e61f35b01bd30aeb144b9136b52239956e0f1d7e
SHA256f6e6eb9e27a83689960f2438d86512092db2532c97d460e9b2e6a23834fa48f3
SHA51243f84f1d28bf6ebbf338970c20ecbb153bdbf4d199d036136663c26a504d6ad454dc18cb108e90b4329c74b483e82b513462e119d1f8df01b2e926e123c38808