Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23-08-2024 14:07

General

  • Target

    1aa39d856320c84715f02d2bcbc6d800b5a7a431ebd10cb014b1cd11ea38d984.exe

  • Size

    9.1MB

  • MD5

    8c4a8c70e65686184b1713fd5d9475e5

  • SHA1

    b4ae29264869f932d999b7d9729eee4543bd0747

  • SHA256

    1aa39d856320c84715f02d2bcbc6d800b5a7a431ebd10cb014b1cd11ea38d984

  • SHA512

    692447b769f0e4d0401713ed494c4160fe37cdff37584d62cb7b24a778a3e6ea91d2291f3c3b7ffb0d151ffd91ea12461e40c4d2b5c7d5e7f538c2c3d614ad7a

  • SSDEEP

    196608:yW1pXAmPFRLzZCZW8/PgcSS3uQyl620Y:yW1pwmPFRXgHeQ8620

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Themida packer 10 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1aa39d856320c84715f02d2bcbc6d800b5a7a431ebd10cb014b1cd11ea38d984.exe
    "C:\Users\Admin\AppData\Local\Temp\1aa39d856320c84715f02d2bcbc6d800b5a7a431ebd10cb014b1cd11ea38d984.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2480
    • C:\Users\Admin\AppData\Local\GameShield\X2vqtMiSWb6hdVzC\VMware.exe
      "C:\Users\Admin\AppData\Local\GameShield\X2vqtMiSWb6hdVzC\VMware.exe" --file "C:\Users\Admin\AppData\LocalLow\GameShield\27f70b94ae1dbf5a.dat" --debug TCfV5vUSYLDEjbpj
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • System Location Discovery: System Language Discovery
      PID:2744
    • C:\Users\Admin\AppData\Local\Temp\MHAutoPatch登入器.exe
      "C:\Users\Admin\AppData\Local\Temp\MHAutoPatch登入器.exe"
      2⤵
      • Executes dropped EXE
      PID:2604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\GameShield\0bdd5784fc0e47d55cf21ecc353bee09\0bdd5784fc0e47d55cf21ecc353bee09.log

    Filesize

    5B

    MD5

    d1a342bb3f725967660b92ec62db720f

    SHA1

    d5e37f7cee768c2c1b00de5af7e87f60e911567f

    SHA256

    1567a42a0f959939c5d568ccbf29e23f8fec50b82b478dae4150747f2851f361

    SHA512

    ef7caa566eecbd654f12098a57af8fb056a0d884b17eea2d4f022773723258552c017c6b28a9a8ab01fd0d8fd4aeccc65a1300c30208d9fab0134173f438a106

  • C:\Users\Admin\AppData\LocalLow\GameShield\27f70b94ae1dbf5a.dat

    Filesize

    304B

    MD5

    ce08917fbe4fa6d50d81ca3edf372e25

    SHA1

    6adb8c09ecc602df23320af6ed4468e2cd6916b0

    SHA256

    a0a10f83e4f6d139d808a59dd1a033f5a6fe5b8e1a4e4c61ac369cce9d498016

    SHA512

    10367110d1a687c20469a7815ac1809e4d9dc829589320cb001e3a378405359ddd98358fafa7f6a6f5de87c3b3da45b5b795e66c8dba618da58313862353fddf

  • C:\Users\Admin\AppData\LocalLow\GameShield\X2vqtMiSWb6hdVzC\QND.dll

    Filesize

    7.2MB

    MD5

    0625693de76a97d13e308c71d8060e15

    SHA1

    e5eb64f8723046c148931216898d875cb0536e69

    SHA256

    277874869fe2a29a8a5c3c23c3c3932f67a6a60885291c2231dcc07079c1bfa6

    SHA512

    ae7a109efe77337588ea7ea03a4c959b394fec5ab4ab1c973b11e8098790866e784427ce4cd8d3a5ab1b71fda71e1efc7c9054676c8fd8e0d490812436eafe7a

  • C:\Users\Admin\AppData\Local\Temp\MHAutoPatch登入器.exe

    Filesize

    757KB

    MD5

    f074863c54235c114510283250d9690e

    SHA1

    22b1c4c2e4730edd4f4d7d8dfc9e0169e83116d4

    SHA256

    dd21d5c999b1c13ff7e861078947da0c7eb4179627df8ffaca065868ed0d2b89

    SHA512

    041dc9fac6947ffce1ee62e061810b4f577d2d1418be944d1a65b633335fab359e23a8e1f2295e6e04b63aabff6e954df31582783a9a14d96f79594897f7e0dd

  • \Users\Admin\AppData\Local\GameShield\X2vqtMiSWb6hdVzC\VMware.exe

    Filesize

    112KB

    MD5

    d4736d7dead55676c8f42c92bbe01420

    SHA1

    737179a8c52c0eac9fbd3121b5c313e4d1fe372a

    SHA256

    9205116263333633a1fbc9b2a88cfd5c05f0bd8ec3f330303c52f53255f1307f

    SHA512

    1b139a1d415e9ed8e10a664eb9f02a413f9c8c561ae1b17012e2f062dc8a9611a52307f2acbe4607cb545b9402be5916ef1a75b57b68526f923d4d3e33094169

  • memory/2604-42-0x00000000010C0000-0x0000000001180000-memory.dmp

    Filesize

    768KB

  • memory/2744-27-0x0000000010000000-0x0000000010AB7000-memory.dmp

    Filesize

    10.7MB

  • memory/2744-43-0x0000000010000000-0x0000000010AB7000-memory.dmp

    Filesize

    10.7MB

  • memory/2744-44-0x0000000010000000-0x0000000010AB7000-memory.dmp

    Filesize

    10.7MB

  • memory/2744-46-0x0000000010000000-0x0000000010AB7000-memory.dmp

    Filesize

    10.7MB

  • memory/2744-48-0x0000000010000000-0x0000000010AB7000-memory.dmp

    Filesize

    10.7MB

  • memory/2744-26-0x0000000010000000-0x0000000010AB7000-memory.dmp

    Filesize

    10.7MB

  • memory/2744-50-0x0000000010000000-0x0000000010AB7000-memory.dmp

    Filesize

    10.7MB

  • memory/2744-53-0x0000000010000000-0x0000000010AB7000-memory.dmp

    Filesize

    10.7MB

  • memory/2744-54-0x0000000010000000-0x0000000010AB7000-memory.dmp

    Filesize

    10.7MB