Overview
overview
3Static
static
1savedgames.rar
windows7-x64
3savedgames.rar
windows10-2004-x64
3savedgames...medata
windows7-x64
3savedgames...medata
windows10-2004-x64
3savedgames...medata
windows7-x64
3savedgames...medata
windows10-2004-x64
3savedgames...medata
windows7-x64
3savedgames...medata
windows10-2004-x64
3savedgames...medata
windows7-x64
3savedgames...medata
windows10-2004-x64
3savedgames...medata
windows7-x64
3savedgames...medata
windows10-2004-x64
3savedgames...medata
windows7-x64
3savedgames...medata
windows10-2004-x64
3savedgames...medata
windows7-x64
3savedgames...medata
windows10-2004-x64
3savedgames...medata
windows7-x64
3savedgames...medata
windows10-2004-x64
3savedgames...medata
windows7-x64
3savedgames...medata
windows10-2004-x64
3savedgames...medata
windows7-x64
3savedgames...medata
windows10-2004-x64
3savedgames...medata
windows7-x64
3savedgames...medata
windows10-2004-x64
3savedgames...medata
windows7-x64
3savedgames...medata
windows10-2004-x64
3savedgames...medata
windows7-x64
3savedgames...medata
windows10-2004-x64
3savedgames...medata
windows7-x64
3savedgames...medata
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 17:36
Static task
static1
Behavioral task
behavioral1
Sample
savedgames.rar
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
savedgames.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
savedgames/slot1/dlc01.savegamedata
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
savedgames/slot1/dlc01.savegamedata
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
savedgames/slot1/dlc02.savegamedata
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
savedgames/slot1/dlc02.savegamedata
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
savedgames/slot1/dlc03.savegamedata
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
savedgames/slot1/dlc03.savegamedata
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
savedgames/slot1/dlc04.savegamedata
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
savedgames/slot1/dlc04.savegamedata
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
savedgames/slot1/dlc05.savegamedata
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
savedgames/slot1/dlc05.savegamedata
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
savedgames/slot1/dlc06.savegamedata
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
savedgames/slot1/dlc06.savegamedata
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
savedgames/slot1/dlc07.savegamedata
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
savedgames/slot1/dlc07.savegamedata
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
savedgames/slot1/dlc08.savegamedata
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
savedgames/slot1/dlc08.savegamedata
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
savedgames/slot1/dlc09.savegamedata
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
savedgames/slot1/dlc09.savegamedata
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
savedgames/slot1/dlc10.savegamedata
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
savedgames/slot1/dlc10.savegamedata
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
savedgames/slot1/game01.savegamedata
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
savedgames/slot1/game01.savegamedata
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
savedgames/slot5/feopts01.savegamedata
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
savedgames/slot5/feopts01.savegamedata
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
savedgames/slot5/global01.savegamedata
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
savedgames/slot5/global01.savegamedata
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
savedgames/slot5/opts01.savegamedata
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
savedgames/slot5/opts01.savegamedata
Resource
win10v2004-20240802-en
General
-
Target
savedgames/slot1/dlc04.savegamedata
-
Size
58KB
-
MD5
121806134e2b7053de32ff2db37b129f
-
SHA1
21cd38ec883007f63a67f8060ef1d33b617ac99e
-
SHA256
6c4fcaa74bafcda57e2a2bc91d94681ab522185b4edb305149c03f820c5721bf
-
SHA512
ceedbe2e45e564b2cadf4e9bd300d9a12a24c72211cd2b37fcf63240dbee66b140d2816570f448c5cc768a3bccd1675bc3ee29de25e740f361cd642a7e712eb9
-
SSDEEP
12:yrlldaVXOcobB0fflJySVvl2+lRu3eLcRudyVisESQ8SEHuSHs5gis92UIFgjlTH:yplYVeofXZlRu3LI4VRESQ8SEOzghw4
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\savegamedata_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\savegamedata_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\.savegamedata rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\.savegamedata\ = "savegamedata_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\savegamedata_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\savegamedata_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\savegamedata_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\savegamedata_auto_file\shell\Read rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1236 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1236 AcroRd32.exe 1236 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2116 wrote to memory of 1924 2116 cmd.exe 31 PID 2116 wrote to memory of 1924 2116 cmd.exe 31 PID 2116 wrote to memory of 1924 2116 cmd.exe 31 PID 1924 wrote to memory of 1236 1924 rundll32.exe 32 PID 1924 wrote to memory of 1236 1924 rundll32.exe 32 PID 1924 wrote to memory of 1236 1924 rundll32.exe 32 PID 1924 wrote to memory of 1236 1924 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\savedgames\slot1\dlc04.savegamedata1⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\savedgames\slot1\dlc04.savegamedata2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\savedgames\slot1\dlc04.savegamedata"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1236
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d3b6edeea5d1b89b62cf011413eb78cb
SHA125e5855c1f30376313574e2a227d369d797298ac
SHA2560efac91635bed6fb59fb3a31a22e32d33da36011e1aa844b4a3c06271ca52574
SHA512cd3c010a40ad534adf07dfacb09e9557eb09cc83ee22e582f1d2d255077277ab272d44051a468fef89b5a0398e9d7e7fc86d4c58198b945c43c334c222664385