Overview
overview
7Static
static
3RJ332432 -...me.exe
windows7-x64
7RJ332432 -...me.exe
windows10-2004-x64
7RJ332432 -...ook.js
windows7-x64
3RJ332432 -...ook.js
windows10-2004-x64
3RJ332432 -...eIn.js
windows7-x64
3RJ332432 -...eIn.js
windows10-2004-x64
3RJ332432 -...Exp.js
windows7-x64
3RJ332432 -...Exp.js
windows10-2004-x64
3RJ332432 -...les.js
windows7-x64
3RJ332432 -...les.js
windows10-2004-x64
3RJ332432 -...und.js
windows7-x64
3RJ332432 -...und.js
windows10-2004-x64
3RJ332432 -...ice.js
windows7-x64
3RJ332432 -...ice.js
windows10-2004-x64
3RJ332432 -...dow.js
windows7-x64
3RJ332432 -...dow.js
windows10-2004-x64
3RJ332432 -...ook.js
windows7-x64
3RJ332432 -...ook.js
windows10-2004-x64
3RJ332432 -...age.js
windows7-x64
3RJ332432 -...age.js
windows10-2004-x64
3RJ332432 -...dow.js
windows7-x64
3RJ332432 -...dow.js
windows10-2004-x64
3RJ332432 -...sor.js
windows7-x64
3RJ332432 -...sor.js
windows10-2004-x64
3RJ332432 -...nds.js
windows7-x64
3RJ332432 -...nds.js
windows10-2004-x64
3RJ332432 -...Hud.js
windows7-x64
3RJ332432 -...Hud.js
windows10-2004-x64
3RJ332432 -...hMv.js
windows7-x64
3RJ332432 -...hMv.js
windows10-2004-x64
3RJ332432 -...hop.js
windows7-x64
3RJ332432 -...hop.js
windows10-2004-x64
3Analysis
-
max time kernel
31s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 10:30
Static task
static1
Behavioral task
behavioral1
Sample
RJ332432 - Zombie Party/Game.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
RJ332432 - Zombie Party/Game.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
RJ332432 - Zombie Party/www/js/plugins/EnemyBook.js
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
RJ332432 - Zombie Party/www/js/plugins/EnemyBook.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
RJ332432 - Zombie Party/www/js/plugins/EnemySlideIn.js
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
RJ332432 - Zombie Party/www/js/plugins/EnemySlideIn.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
RJ332432 - Zombie Party/www/js/plugins/ExtendsExp.js
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
RJ332432 - Zombie Party/www/js/plugins/ExtendsExp.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
RJ332432 - Zombie Party/www/js/plugins/FloatVariables.js
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
RJ332432 - Zombie Party/www/js/plugins/FloatVariables.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
RJ332432 - Zombie Party/www/js/plugins/Foreground.js
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
RJ332432 - Zombie Party/www/js/plugins/Foreground.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
RJ332432 - Zombie Party/www/js/plugins/HzRandomChoice.js
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
RJ332432 - Zombie Party/www/js/plugins/HzRandomChoice.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
RJ332432 - Zombie Party/www/js/plugins/InfoWindow.js
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
RJ332432 - Zombie Party/www/js/plugins/InfoWindow.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
RJ332432 - Zombie Party/www/js/plugins/ItemBook.js
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
RJ332432 - Zombie Party/www/js/plugins/ItemBook.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
RJ332432 - Zombie Party/www/js/plugins/KMS_SomStyleDamage.js
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
RJ332432 - Zombie Party/www/js/plugins/KMS_SomStyleDamage.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
RJ332432 - Zombie Party/www/js/plugins/Lunatlazur_ActorNameWindow.js
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
RJ332432 - Zombie Party/www/js/plugins/Lunatlazur_ActorNameWindow.js
Resource
win10v2004-20240704-en
Behavioral task
behavioral23
Sample
RJ332432 - Zombie Party/www/js/plugins/MKR_PlayerSensor.js
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
RJ332432 - Zombie Party/www/js/plugins/MKR_PlayerSensor.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
RJ332432 - Zombie Party/www/js/plugins/MOG_BattleCommands.js
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
RJ332432 - Zombie Party/www/js/plugins/MOG_BattleCommands.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
RJ332432 - Zombie Party/www/js/plugins/MOG_BattleHud.js
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
RJ332432 - Zombie Party/www/js/plugins/MOG_BattleHud.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
RJ332432 - Zombie Party/www/js/plugins/MadeWithMv.js
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
RJ332432 - Zombie Party/www/js/plugins/MadeWithMv.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
RJ332432 - Zombie Party/www/js/plugins/Mano_CoinShop.js
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
RJ332432 - Zombie Party/www/js/plugins/Mano_CoinShop.js
Resource
win10v2004-20240709-en
General
-
Target
RJ332432 - Zombie Party/Game.exe
-
Size
1.5MB
-
MD5
9ebc7dd20fa66f5deabfd8873a4ed8c6
-
SHA1
cf1b1da0e5215738a8e972077be5804cb326b8ed
-
SHA256
487bd28f3d0b43ed9827ba519d6d113c4f31059bd62b4492da586c7bc82a9474
-
SHA512
5d0a052edec070ee573bc43ed9eb7eb92c0460efe60a5abc31d1200e092937b91eafce5492cd945d46645f9029f0f80a37907fe6292639d37f15f58dae377271
-
SSDEEP
24576:5XVhPcthsRP/d3qI4N+Nl49LPSncvK51CvO8ofTWIZAmOLB:R5RP/d6IxNIKnL5mO8ofTrZAmm
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Control Panel\International\Geo\Nation Game.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2696 Game.exe 2500 Game.exe 2500 Game.exe 2576 Game.exe 2500 Game.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2500 Game.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2356 2500 Game.exe 31 PID 2500 wrote to memory of 2356 2500 Game.exe 31 PID 2500 wrote to memory of 2356 2500 Game.exe 31 PID 2500 wrote to memory of 2356 2500 Game.exe 31 PID 2500 wrote to memory of 2696 2500 Game.exe 32 PID 2500 wrote to memory of 2696 2500 Game.exe 32 PID 2500 wrote to memory of 2696 2500 Game.exe 32 PID 2500 wrote to memory of 2696 2500 Game.exe 32 PID 2500 wrote to memory of 2576 2500 Game.exe 33 PID 2500 wrote to memory of 2576 2500 Game.exe 33 PID 2500 wrote to memory of 2576 2500 Game.exe 33 PID 2500 wrote to memory of 2576 2500 Game.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\RJ332432 - Zombie Party\Game.exe"C:\Users\Admin\AppData\Local\Temp\RJ332432 - Zombie Party\Game.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\RJ332432 - Zombie Party\Game.exe"C:\Users\Admin\AppData\Local\Temp\RJ332432 - Zombie Party\Game.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\nwjs\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\nwjs\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\nwjs\User Data" --annotation=plat=Win32 --annotation=prod= --annotation=ver= --initial-client-data=0x158,0x15c,0x160,0x154,0x164,0x74d9d0e0,0x74d9d0f0,0x74d9d0fc2⤵PID:2356
-
-
C:\Users\Admin\AppData\Local\Temp\RJ332432 - Zombie Party\Game.exe"C:\Users\Admin\AppData\Local\Temp\RJ332432 - Zombie Party\Game.exe" --type=gpu-process --field-trial-handle=1292,6934151785931801926,9816340824822031117,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\RJ332432 - Zombie Party" --gpu-preferences=KAAAAAAAAAAABwCAAQAAAAAAAAAAAGAAAQAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor=Microsoft --gpu-driver-version=6.1.7600.16385 --gpu-driver-date=6-21-2006 --user-data-dir="C:\Users\Admin\AppData\Local\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\RJ332432 - Zombie Party" --service-request-channel-token=BE638A3974EEDBA36C48C532EAB22DFF --mojo-platform-channel-handle=1332 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2696
-
-
C:\Users\Admin\AppData\Local\Temp\RJ332432 - Zombie Party\Game.exe"C:\Users\Admin\AppData\Local\Temp\RJ332432 - Zombie Party\Game.exe" --type=renderer --js-flags=--expose-gc --no-sandbox --no-zygote --field-trial-handle=1292,6934151785931801926,9816340824822031117,131072 --service-pipe-token=6A2C9D8F142BFBB26DE5746412F27D27 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\RJ332432 - Zombie Party" --nwjs --extension-process --disable-client-side-phishing-detection --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --blink-settings=disallowFetchForDocWrittenScriptsInMainFrame=false,disallowFetchForDocWrittenScriptsInMainFrameOnSlowConnections=true,cssExternalScannerNoPreload=false,cssExternalScannerPreload=true --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-checker-imaging --enable-compositor-image-animations --service-request-channel-token=6A2C9D8F142BFBB26DE5746412F27D27 --renderer-client-id=3 --mojo-platform-channel-handle=1952 /prefetch:12⤵
- Suspicious behavior: EnumeratesProcesses
PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
1KB
MD50806225544ebfdc326c472654851193a
SHA16afd9f3b252cd195b9189c07d076e8950db400a7
SHA256dd887f9c7db7ae08e89d72bbd43edbe5b609e745ff569f1e90a09473a68df529
SHA51283ab46435c4a5e6793bba13edb0539e72f8d61fcf81cb6a96f8d7d8d8b75f84b7905349def03ca7b95257d701cd96f2394ed01a761469dacc707d6365b48b2a0
-
Filesize
40B
MD5f0db6fc89b8b3cfd73ba7c39a43d5435
SHA18d485d9179e5111b2df5096c54ad9ffffb789310
SHA2561f025182b93a04677abf49f741642a84c14905aaabee54f65e0d04c91e55b106
SHA512a26e8ee11c5370d2a5dd152e84feda884ecbcacb384b560ae2b4c9cc567c3960ed174376bbe0ed3cbafa120b0a6f0f794cc154a07bb8302a952b6920abfa67d1