Analysis

  • max time kernel
    140s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11/08/2024, 22:24

General

  • Target

    gamebbx.exe

  • Size

    4.4MB

  • MD5

    fa13ce2cbeb6c168384ede609e2a8b47

  • SHA1

    c0ae1ea8514ed078b3843865fac31e25004d3cea

  • SHA256

    d8b8485a9cd927008d6e75214ae9acb07d234af577ae2c699ea14a52dee8f776

  • SHA512

    1958ae3aee4aad3bfbcc149439bb2cccf109ea603ba5031d8e3675921fb1ee2eba0d6a389489d351b551bffbb8b93f86a3ebb82fce334af37ddf2f11faa43030

  • SSDEEP

    98304:r2w51VjP9fIRqW/5ehKiugj51tkZiRcIIIkkoVZM:rV5Db9wFIo0tkZi/o3M

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\gamebbx.exe
    "C:\Users\Admin\AppData\Local\Temp\gamebbx.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2624
    • C:\Users\Admin\AppData\Local\Temp\is-3JNVR.tmp\gamebbx.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-3JNVR.tmp\gamebbx.tmp" /SL5="$40150,4283141,221696,C:\Users\Admin\AppData\Local\Temp\gamebbx.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      PID:3044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\is-3JNVR.tmp\gamebbx.tmp

    Filesize

    872KB

    MD5

    8466d1f908959b327432f78e121a40d0

    SHA1

    502a9c5ccb06f6c5cec3de931da359d0bb9db832

    SHA256

    07b08630de7c0d0b2d4acffc872b41e4a76ba100b23b007c39e9c1c8c895caef

    SHA512

    72c2ec3a13c84fe7508fa49ae26374a1b1cb1e7e8a9d8c9b736a5415ed9860451414004bcc58f660b010db6d0c04d50f59d4a7bfb378508cf8878d5789dca5c4

  • \Users\Admin\AppData\Local\Temp\is-O35SV.tmp\UpdateIcon.dll

    Filesize

    32KB

    MD5

    9da5e5c13c7cdb9d40a6d48dc144f103

    SHA1

    9ca63e96a74cd6e15650381713a9f21f74b2bfd0

    SHA256

    06bc5482590c17db6d3a8a2ed284d507ed93e239690e508a44a8af6c461cd218

    SHA512

    914b31962ebeea3957a1e600365197744420ee73ae36b5b9aec9a32ba24310d133f1cb377dc53b04017815a3010b0f0875e250641d40e063369627ac1c67d7fd

  • \Users\Admin\AppData\Local\Temp\is-O35SV.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-O35SV.tmp\psvince.dll

    Filesize

    36KB

    MD5

    a4e5c512b047a6d9dc38549161cac4de

    SHA1

    49d3e74f9604a6c61cda04ccc6d3cda87e280dfb

    SHA256

    c7f1e7e866834d9024f97c2b145c09d106e447e8abd65a10a1732116d178e44e

    SHA512

    2edb8a492b8369d56dda735a652c9e08539a5c4709a794efaff91adcae192a636d0545725af16cf8c31b275b34c2f19e4b019b57fb9050b99de65a4c08e3eee1

  • memory/2624-2-0x0000000000401000-0x000000000040B000-memory.dmp

    Filesize

    40KB

  • memory/2624-0-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2624-23-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/3044-11-0x0000000000400000-0x00000000004EA000-memory.dmp

    Filesize

    936KB

  • memory/3044-18-0x00000000002C0000-0x00000000002CE000-memory.dmp

    Filesize

    56KB

  • memory/3044-25-0x00000000002C0000-0x00000000002CE000-memory.dmp

    Filesize

    56KB

  • memory/3044-24-0x0000000000400000-0x00000000004EA000-memory.dmp

    Filesize

    936KB