Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/08/2024, 21:04
Static task
static1
Behavioral task
behavioral1
Sample
Jugar HaxBall.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Jugar HaxBall.exe
Resource
win10v2004-20240802-en
General
-
Target
Jugar HaxBall.exe
-
Size
139.8MB
-
MD5
54f3eb06111c0f6a1b4bb7c7d7e35554
-
SHA1
c6df4b9f0a5963577d0bb7b37e51535a9430173a
-
SHA256
40c07d724e28dd80fc80385fa86d1f68f4ed506680d7f971b935134f50196c70
-
SHA512
97a9b7c8d75b39a1708d6f3ba452892dd6ce2898ce15bad172bddd5354727c56ecd44d0b1b1682a7473109ae851bf1c6b0203ef002f95a0194fc672d0a0e37cf
-
SSDEEP
786432:hRT1bOCyoOhQKqECyrtwQAlI3R8JJCy+0a9a8lZGrkyso6d4QPEptZjzWj:HTwRoOC3EsQAlyRwCy+0a9aZkyskpj
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133677112210012817" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3164 chrome.exe 3164 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3164 wrote to memory of 3636 3164 chrome.exe 110 PID 3164 wrote to memory of 3636 3164 chrome.exe 110 PID 3164 wrote to memory of 3856 3164 chrome.exe 111 PID 3164 wrote to memory of 3856 3164 chrome.exe 111 PID 3164 wrote to memory of 3856 3164 chrome.exe 111 PID 3164 wrote to memory of 3856 3164 chrome.exe 111 PID 3164 wrote to memory of 3856 3164 chrome.exe 111 PID 3164 wrote to memory of 3856 3164 chrome.exe 111 PID 3164 wrote to memory of 3856 3164 chrome.exe 111 PID 3164 wrote to memory of 3856 3164 chrome.exe 111 PID 3164 wrote to memory of 3856 3164 chrome.exe 111 PID 3164 wrote to memory of 3856 3164 chrome.exe 111 PID 3164 wrote to memory of 3856 3164 chrome.exe 111 PID 3164 wrote to memory of 3856 3164 chrome.exe 111 PID 3164 wrote to memory of 3856 3164 chrome.exe 111 PID 3164 wrote to memory of 3856 3164 chrome.exe 111 PID 3164 wrote to memory of 3856 3164 chrome.exe 111 PID 3164 wrote to memory of 3856 3164 chrome.exe 111 PID 3164 wrote to memory of 3856 3164 chrome.exe 111 PID 3164 wrote to memory of 3856 3164 chrome.exe 111 PID 3164 wrote to memory of 3856 3164 chrome.exe 111 PID 3164 wrote to memory of 3856 3164 chrome.exe 111 PID 3164 wrote to memory of 3856 3164 chrome.exe 111 PID 3164 wrote to memory of 3856 3164 chrome.exe 111 PID 3164 wrote to memory of 3856 3164 chrome.exe 111 PID 3164 wrote to memory of 3856 3164 chrome.exe 111 PID 3164 wrote to memory of 3856 3164 chrome.exe 111 PID 3164 wrote to memory of 3856 3164 chrome.exe 111 PID 3164 wrote to memory of 3856 3164 chrome.exe 111 PID 3164 wrote to memory of 3856 3164 chrome.exe 111 PID 3164 wrote to memory of 3856 3164 chrome.exe 111 PID 3164 wrote to memory of 3856 3164 chrome.exe 111 PID 3164 wrote to memory of 3304 3164 chrome.exe 112 PID 3164 wrote to memory of 3304 3164 chrome.exe 112 PID 3164 wrote to memory of 1924 3164 chrome.exe 113 PID 3164 wrote to memory of 1924 3164 chrome.exe 113 PID 3164 wrote to memory of 1924 3164 chrome.exe 113 PID 3164 wrote to memory of 1924 3164 chrome.exe 113 PID 3164 wrote to memory of 1924 3164 chrome.exe 113 PID 3164 wrote to memory of 1924 3164 chrome.exe 113 PID 3164 wrote to memory of 1924 3164 chrome.exe 113 PID 3164 wrote to memory of 1924 3164 chrome.exe 113 PID 3164 wrote to memory of 1924 3164 chrome.exe 113 PID 3164 wrote to memory of 1924 3164 chrome.exe 113 PID 3164 wrote to memory of 1924 3164 chrome.exe 113 PID 3164 wrote to memory of 1924 3164 chrome.exe 113 PID 3164 wrote to memory of 1924 3164 chrome.exe 113 PID 3164 wrote to memory of 1924 3164 chrome.exe 113 PID 3164 wrote to memory of 1924 3164 chrome.exe 113 PID 3164 wrote to memory of 1924 3164 chrome.exe 113 PID 3164 wrote to memory of 1924 3164 chrome.exe 113 PID 3164 wrote to memory of 1924 3164 chrome.exe 113 PID 3164 wrote to memory of 1924 3164 chrome.exe 113 PID 3164 wrote to memory of 1924 3164 chrome.exe 113 PID 3164 wrote to memory of 1924 3164 chrome.exe 113 PID 3164 wrote to memory of 1924 3164 chrome.exe 113 PID 3164 wrote to memory of 1924 3164 chrome.exe 113 PID 3164 wrote to memory of 1924 3164 chrome.exe 113 PID 3164 wrote to memory of 1924 3164 chrome.exe 113 PID 3164 wrote to memory of 1924 3164 chrome.exe 113 PID 3164 wrote to memory of 1924 3164 chrome.exe 113 PID 3164 wrote to memory of 1924 3164 chrome.exe 113 PID 3164 wrote to memory of 1924 3164 chrome.exe 113 PID 3164 wrote to memory of 1924 3164 chrome.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\Jugar HaxBall.exe"C:\Users\Admin\AppData\Local\Temp\Jugar HaxBall.exe"1⤵PID:2268
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffb503acc40,0x7ffb503acc4c,0x7ffb503acc582⤵PID:3636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1992,i,11200084033549387079,15179430485019546180,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1988 /prefetch:22⤵PID:3856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2060,i,11200084033549387079,15179430485019546180,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2144 /prefetch:32⤵PID:3304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2284,i,11200084033549387079,15179430485019546180,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2480 /prefetch:82⤵PID:1924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,11200084033549387079,15179430485019546180,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:2428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3232,i,11200084033549387079,15179430485019546180,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:1500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3616,i,11200084033549387079,15179430485019546180,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4492 /prefetch:12⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4792,i,11200084033549387079,15179430485019546180,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4800 /prefetch:82⤵PID:4304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4972,i,11200084033549387079,15179430485019546180,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4980 /prefetch:82⤵PID:4052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5096,i,11200084033549387079,15179430485019546180,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:4900
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4780
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD55c866a764f3ff52cd7c4d151d358e601
SHA1d92cf42d1a46be1bbff1a8098140f3a91c8cef87
SHA256dbe4a8c03105ad6ec1b48e2e7927fc480931f6efe75ea537435f4eb1d3fa1fea
SHA5126f223ad1cf033a77e1a1990a75b3181258f0f93af549c9df670822f07862535aeb436a67a0f7eda2d65fda50f68d2376387aa030617c41b4d7b47975af86ed0d
-
Filesize
210KB
MD548d2860dd3168b6f06a4f27c6791bcaa
SHA1f5f803efed91cd45a36c3d6acdffaaf0e863bf8c
SHA25604d7bf7a6586ef00516bdb3f7b96c65e0b9c6b940f4b145121ed00f6116bbb77
SHA512172da615b5b97a0c17f80ddd8d7406e278cd26afd1eb45a052cde0cb55b92febe49773b1e02cf9e9adca2f34abbaa6d7b83eaad4e08c828ef4bf26f23b95584e
-
Filesize
216B
MD56fe903123d9d43f6ad4c5f806b7dfc87
SHA14383946bbe9dedcf79926aaa08592c6e41ecc334
SHA256e361f36b59f9dc692a97d179826557d1b17fba6002dcdcd4f7f5d676bdaae867
SHA51242d5e759c3d90571e5c28a58a1c99479eb3034a305fd92dfeb6d5bb6614b2d9cd249e2570f242b60d66910ae63500d586d9b6580742c216b00b7233f91dd6920
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
352B
MD5c80f4313e1e9530d696a2fe15ed23db4
SHA12da8a39fec52872a30a3bea63c69d81e569c06a7
SHA25619f4537528c39b8912f12b418741359550b785240cb2961c45e9ca8a82394e16
SHA512aec3a21ae31938127f06c058327960cf33c93e73234364eaffc70d310c98f6ef95cc08ed0967189996a007fa3efaa50d43b888fac7298e6035fff04210b713eb
-
Filesize
9KB
MD587bd2fe5c3fb10e7c38793c241c6968b
SHA10f3dd27b94c084e3b06fdb130b99818358e0cfce
SHA256c212a1bedc3f4560c35e379ce61cf80969dca8fb09d3129cd1560bda4ac57db8
SHA5123e237806690fc76e7cffd7cdeb33005a48e7c8d314e1307aa4a2ddffb39dfdc163685fc93392f0ae82c58e891f576c34aa34167bc9c90238f6c3fc7a7398ad62
-
Filesize
9KB
MD5cf750a97bcf695156d0d061d3be07675
SHA1b242f514b021cd8f15e6afa5673834572e5e1b63
SHA256cbf0fdab72545be922ca58da5417f1814326abbc90252839948501c68f733711
SHA512b4a3aa9a47e2ee92a46765961e5705832e9160f6ce81e94b2974796948cf2ce309703b7f54d53dedb1115fafcc67b4d4165d2ed58b00f2cb216cf7287b94a0d8
-
Filesize
15KB
MD5d92a2e7fc251371a71508700689f41ac
SHA1aadcfde0d0f1ce8bb4a5f5c6c0f717e4199752b8
SHA256bdf8ee6b0eaae2257935a68a6803e5c9a9f20a5abdb064406ff79d1ebad86ec5
SHA5123d22b97a6b2e67efb6162b299eac42d37b232cd1cf0b578ee170595cc812e1275e0811bf6eca85f2c5138493e0864f5524b251a5a6f19a457def42b774fc5ea3
-
Filesize
194KB
MD5bc65410c6b60eae4d4ad148a4d8d78e2
SHA187bb2c012abc50acafc0042dd9cc6705843ccf48
SHA25618496341e6fb89242e7c5ca209f0c82b01afe537fabeecb8fa824f53e4c673b2
SHA512cb5168dbd99f2129156a673c9b9027cb74bc2b228445f9acfb257a7d5da904ef2e65821592add9616a260f41a82a79edc07e096de35bb0b5f14e1d9d44e13c47
-
Filesize
194KB
MD515c75666383669094e57e700777b4cc9
SHA114edd19aa492ddc7a079118bb4d70b154ed2f49f
SHA2564eaaacafbbb61292c778377464bdd4ac5908748610cdddbada3b32e12035f717
SHA512121580d1ad15b57be328e186ea8572f55d44433376b632e2a74f4c196b0eaba2ccb860883149f387c6df62cd50846bbf5c642f4a49cfa99d2cac622559a457f6