Analysis

  • max time kernel
    31s
  • max time network
    35s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19/07/2024, 10:30

General

  • Target

    RJ332432 - Zombie Party/Game.exe

  • Size

    1.5MB

  • MD5

    9ebc7dd20fa66f5deabfd8873a4ed8c6

  • SHA1

    cf1b1da0e5215738a8e972077be5804cb326b8ed

  • SHA256

    487bd28f3d0b43ed9827ba519d6d113c4f31059bd62b4492da586c7bc82a9474

  • SHA512

    5d0a052edec070ee573bc43ed9eb7eb92c0460efe60a5abc31d1200e092937b91eafce5492cd945d46645f9029f0f80a37907fe6292639d37f15f58dae377271

  • SSDEEP

    24576:5XVhPcthsRP/d3qI4N+Nl49LPSncvK51CvO8ofTWIZAmOLB:R5RP/d6IxNIKnL5mO8ofTrZAmm

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RJ332432 - Zombie Party\Game.exe
    "C:\Users\Admin\AppData\Local\Temp\RJ332432 - Zombie Party\Game.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2500
    • C:\Users\Admin\AppData\Local\Temp\RJ332432 - Zombie Party\Game.exe
      "C:\Users\Admin\AppData\Local\Temp\RJ332432 - Zombie Party\Game.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\nwjs\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\nwjs\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\nwjs\User Data" --annotation=plat=Win32 --annotation=prod= --annotation=ver= --initial-client-data=0x158,0x15c,0x160,0x154,0x164,0x74d9d0e0,0x74d9d0f0,0x74d9d0fc
      2⤵
        PID:2356
      • C:\Users\Admin\AppData\Local\Temp\RJ332432 - Zombie Party\Game.exe
        "C:\Users\Admin\AppData\Local\Temp\RJ332432 - Zombie Party\Game.exe" --type=gpu-process --field-trial-handle=1292,6934151785931801926,9816340824822031117,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\RJ332432 - Zombie Party" --gpu-preferences=KAAAAAAAAAAABwCAAQAAAAAAAAAAAGAAAQAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor=Microsoft --gpu-driver-version=6.1.7600.16385 --gpu-driver-date=6-21-2006 --user-data-dir="C:\Users\Admin\AppData\Local\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\RJ332432 - Zombie Party" --service-request-channel-token=BE638A3974EEDBA36C48C532EAB22DFF --mojo-platform-channel-handle=1332 /prefetch:2
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2696
      • C:\Users\Admin\AppData\Local\Temp\RJ332432 - Zombie Party\Game.exe
        "C:\Users\Admin\AppData\Local\Temp\RJ332432 - Zombie Party\Game.exe" --type=renderer --js-flags=--expose-gc --no-sandbox --no-zygote --field-trial-handle=1292,6934151785931801926,9816340824822031117,131072 --service-pipe-token=6A2C9D8F142BFBB26DE5746412F27D27 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\RJ332432 - Zombie Party" --nwjs --extension-process --disable-client-side-phishing-detection --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --blink-settings=disallowFetchForDocWrittenScriptsInMainFrame=false,disallowFetchForDocWrittenScriptsInMainFrameOnSlowConnections=true,cssExternalScannerNoPreload=false,cssExternalScannerPreload=true --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-checker-imaging --enable-compositor-image-animations --service-request-channel-token=6A2C9D8F142BFBB26DE5746412F27D27 --renderer-client-id=3 --mojo-platform-channel-handle=1952 /prefetch:1
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2576

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\User Data\Default\Download Service\EntryDB\MANIFEST-000001

      Filesize

      41B

      MD5

      5af87dfd673ba2115e2fcf5cfdb727ab

      SHA1

      d5b5bbf396dc291274584ef71f444f420b6056f1

      SHA256

      f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

      SHA512

      de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

    • C:\Users\Admin\AppData\Local\User Data\Default\Sync Data\LevelDB\CURRENT

      Filesize

      16B

      MD5

      46295cac801e5d4857d09837238a6394

      SHA1

      44e0fa1b517dbf802b18faf0785eeea6ac51594b

      SHA256

      0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

      SHA512

      8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

    • C:\Users\Admin\AppData\Local\User Data\Default\data_reduction_proxy_leveldb\CURRENT

      Filesize

      16B

      MD5

      206702161f94c5cd39fadd03f4014d98

      SHA1

      bd8bfc144fb5326d21bd1531523d9fb50e1b600a

      SHA256

      1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

      SHA512

      0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

    • C:\Users\Admin\AppData\Local\User Data\Local State

      Filesize

      1KB

      MD5

      0806225544ebfdc326c472654851193a

      SHA1

      6afd9f3b252cd195b9189c07d076e8950db400a7

      SHA256

      dd887f9c7db7ae08e89d72bbd43edbe5b609e745ff569f1e90a09473a68df529

      SHA512

      83ab46435c4a5e6793bba13edb0539e72f8d61fcf81cb6a96f8d7d8d8b75f84b7905349def03ca7b95257d701cd96f2394ed01a761469dacc707d6365b48b2a0

    • C:\Users\Admin\AppData\Local\nwjs\User Data\Crashpad\settings.dat

      Filesize

      40B

      MD5

      f0db6fc89b8b3cfd73ba7c39a43d5435

      SHA1

      8d485d9179e5111b2df5096c54ad9ffffb789310

      SHA256

      1f025182b93a04677abf49f741642a84c14905aaabee54f65e0d04c91e55b106

      SHA512

      a26e8ee11c5370d2a5dd152e84feda884ecbcacb384b560ae2b4c9cc567c3960ed174376bbe0ed3cbafa120b0a6f0f794cc154a07bb8302a952b6920abfa67d1