Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 14:04

General

  • Target

    GDevelop.exe

  • Size

    139.9MB

  • MD5

    c89e3deefd5ec0cdd95d7bba71d734ac

  • SHA1

    886a4b9c072e4d8b6b56aee61190a6ca1233709c

  • SHA256

    796d03445a99286b19a815da7f37f28f31de88bf73c8c946a0eb77432de14205

  • SHA512

    42030b8d36eddf240b42ad9fe7b8773eeed4cc5c85573c417d0649dae463ce04703c1f9a36170f0c585b091e24cee8af78b690b8984a26666749ef9da99f9a84

  • SSDEEP

    786432:v56tMJLlSDPXBFXXAKuLQPeL0wGs4pO1aFfSQvk/os10tBf54PsSgvE:RWMDU/BNXoQPeL0q4pO1aFfMoA0FS6

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 16 IoCs
  • Suspicious use of SendNotifyMessage 16 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\GDevelop.exe
    "C:\Users\Admin\AppData\Local\Temp\GDevelop.exe"
    1⤵
    • Checks computer location settings
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Users\Admin\AppData\Local\Temp\GDevelop.exe
      "C:\Users\Admin\AppData\Local\Temp\GDevelop.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\GDevelop 5" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1008 --field-trial-handle=1092,i,4810366611775823733,7253167899974099118,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
      2⤵
        PID:2648
      • C:\Users\Admin\AppData\Local\Temp\GDevelop.exe
        "C:\Users\Admin\AppData\Local\Temp\GDevelop.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\GDevelop 5" --standard-schemes --secure-schemes --bypasscsp-schemes --cors-schemes --fetch-schemes --service-worker-schemes --streaming-schemes --mojo-platform-channel-handle=1260 --field-trial-handle=1092,i,4810366611775823733,7253167899974099118,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
        2⤵
          PID:2604
        • C:\Users\Admin\AppData\Local\Temp\GDevelop.exe
          "C:\Users\Admin\AppData\Local\Temp\GDevelop.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\GDevelop 5" --standard-schemes --secure-schemes --bypasscsp-schemes --cors-schemes --fetch-schemes --service-worker-schemes --streaming-schemes --app-user-model-id=gdevelop.ide --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --enable-blink-features=WebAppWindowControlsOverlay --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=1484 --field-trial-handle=1092,i,4810366611775823733,7253167899974099118,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1
          2⤵
          • Checks computer location settings
          • Suspicious behavior: EnumeratesProcesses
          PID:2940
        • C:\Users\Admin\AppData\Local\Temp\GDevelop.exe
          "C:\Users\Admin\AppData\Local\Temp\GDevelop.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\GDevelop 5" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1324 --field-trial-handle=1092,i,4810366611775823733,7253167899974099118,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
          2⤵
            PID:316

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

          Filesize

          1KB

          MD5

          55540a230bdab55187a841cfe1aa1545

          SHA1

          363e4734f757bdeb89868efe94907774a327695e

          SHA256

          d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

          SHA512

          c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

          Filesize

          230B

          MD5

          ae11003c182533a4c2c1fc0760077a31

          SHA1

          83ebc4bc79122c71bb44332c2120d49f14ee0587

          SHA256

          5fb39bad19b0c8ff7abd14095f5c36e29cbbc330bda6fb1925807f188255301a

          SHA512

          e873555e4aae050651503cef54242eeae7273155b8d416456f94bd8ad3ef65672df67fb31680555d2022b5c79fdad759d7615c66fca560614b4b7cbe107a0a22

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          b352ae7e72ef35bd19c7900115ddb585

          SHA1

          288b611ee05b3a7828bcf222319cb999d638c50b

          SHA256

          d00fd11d0f52c443a9bf8ebc6487a36984b10ba12e450b20928ad970e2d8c4e5

          SHA512

          0292b67dd621d3a8f34835cb7f14d48eccba06c92dda6af70d16bb43234a6ef3cd7533112362ffa172164f199803d5d9c422f3d7e59481169e519cb9614023e7

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          e643674000fb015c0ac72bd7d8bdcc30

          SHA1

          98015fe67fe4874b987fdf4da6bdae8d9589966b

          SHA256

          59b608a935812d684a7ce6d4131de5fff68f48a2390735138e1155fcdb17e166

          SHA512

          f7634df23e47e0c80ccbdd41aa19f2d186b0c65e4262bdded1dad907abf992753f0fb29fa36e8aaf5f725e24fb0e881fa35c8ee5127cf0e9ddc6668f0028a583

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          d11073db19560f63aced37a5befb3389

          SHA1

          d16e619b9ccd17c91c428159724ee893feb76b3b

          SHA256

          14a01f809a0a0aab4d51da37a3324af955fb5643d06d71c4d54c9e8dae343e4d

          SHA512

          50d7159105260a3547c9dd8fa1a5c625faa5a1603cbe380355c43f9592a6dc480c4eaf5a1d5b66cb8ae88122ea0b82739d8bbbe62cb3bed01341f1a960d35c2f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          085a58825582f0127678bffa18c8b469

          SHA1

          786aa0f26dad5bcd0265c023d003c8e83dc6bdeb

          SHA256

          736f5b720da9489d50a954431b5e0051ee29dc7724f5bf48f421d30941bc47e8

          SHA512

          5c694faf77cb4fdc32625edc214037169ff733ff585eced1cd96b81b3d8863c79579dc6ab2266bcd7d82b7b50588ed522fc6484228e12d70dcd5197e20e9ce79

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          1a9f8b96b474f7f68d1bf9bfd1ff843c

          SHA1

          f216c1b16f9faf6a119bb7f2c953267dabeb906e

          SHA256

          14a7382d12072b288ca7d1794cc445fa1535d885bf74ea209639596b445bd6ef

          SHA512

          1760d7fdac859255731d7f320e268aac193f7fce84b30e9178819b36ec2f536729c79d66b4374b0f98f5535118b542aac01e66236acbed2268df25bb19388e70

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          80810a3d0da34ed0798255d05a626fa0

          SHA1

          75b41f6b18dc737ab75291b5b93e6155668e2b28

          SHA256

          816e769ba259771d02de8e795dfd91cc6f6828a40c4bec7f4188d0fa8c847f84

          SHA512

          542fbddef6a4c46b65e82e59a952b81b55bcef878b812d095eab8c3dbe6af9bee27b4700845d7b4c49c729e921ddb370636f46efcf48c1a166f7438e5c83c3c1

        • C:\Users\Admin\AppData\Local\Temp\Cab629C.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar636A.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • C:\Users\Admin\AppData\Roaming\GDevelop 5\Dictionaries\en-US-9-0.bdic

          Filesize

          441KB

          MD5

          a78ad14e77147e7de3647e61964c0335

          SHA1

          cecc3dd41f4cea0192b24300c71e1911bd4fce45

          SHA256

          0d6803758ff8f87081fafd62e90f0950dfb2dd7991e9607fe76a8f92d0e893fa

          SHA512

          dde24d5ad50d68fc91e9e325d31e66ef8f624b6bb3a07d14ffed1104d3ab5f4ef1d7969a5cde0dfbb19cb31c506f7de97af67c2f244f7e7e8e10648ea8321101

        • C:\Users\Admin\AppData\Roaming\GDevelop 5\Local Storage\leveldb\CURRENT~RFf77538c.TMP

          Filesize

          16B

          MD5

          46295cac801e5d4857d09837238a6394

          SHA1

          44e0fa1b517dbf802b18faf0785eeea6ac51594b

          SHA256

          0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

          SHA512

          8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

        • C:\Users\Admin\AppData\Roaming\GDevelop 5\Preferences

          Filesize

          57B

          MD5

          58127c59cb9e1da127904c341d15372b

          SHA1

          62445484661d8036ce9788baeaba31d204e9a5fc

          SHA256

          be4b8924ab38e8acf350e6e3b9f1f63a1a94952d8002759acd6946c4d5d0b5de

          SHA512

          8d1815b277a93ad590ff79b6f52c576cf920c38c4353c24193f707d66884c942f39ff3989530055d2fade540ade243b41b6eb03cd0cc361c3b5d514cca28b50a

        • C:\Users\Admin\AppData\Roaming\GDevelop 5\Service Worker\Database\MANIFEST-000001

          Filesize

          41B

          MD5

          5af87dfd673ba2115e2fcf5cfdb727ab

          SHA1

          d5b5bbf396dc291274584ef71f444f420b6056f1

          SHA256

          f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

          SHA512

          de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

        • C:\Users\Admin\AppData\Roaming\GDevelop 5\Session Storage\000002.dbtmp

          Filesize

          16B

          MD5

          206702161f94c5cd39fadd03f4014d98

          SHA1

          bd8bfc144fb5326d21bd1531523d9fb50e1b600a

          SHA256

          1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

          SHA512

          0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

        • memory/2648-32-0x0000000076F20000-0x0000000076F21000-memory.dmp

          Filesize

          4KB

        • memory/2648-2-0x0000000000060000-0x0000000000061000-memory.dmp

          Filesize

          4KB