Overview
overview
9Static
static
3CampPinecrest.exe
windows7-x64
7CampPinecrest.exe
windows10-2004-x64
9$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDIR/app-64.7z
windows7-x64
3$PLUGINSDIR/app-64.7z
windows10-2004-x64
3LICENSES.c...m.html
windows7-x64
3LICENSES.c...m.html
windows10-2004-x64
3WorldWars.exe
windows7-x64
1WorldWars.exe
windows10-2004-x64
9d3dcompiler_47.dll
windows10-2004-x64
1ffmpeg.dll
windows7-x64
1ffmpeg.dll
windows10-2004-x64
1libEGL.dll
windows7-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows7-x64
1libGLESv2.dll
windows10-2004-x64
1locales/af.ps1
windows7-x64
3locales/af.ps1
windows10-2004-x64
3locales/uk.ps1
windows7-x64
3locales/uk.ps1
windows10-2004-x64
3resources/...nts.js
windows7-x64
3resources/...nts.js
windows10-2004-x64
3resources/...ent.js
windows7-x64
3resources/...ent.js
windows10-2004-x64
3resources/...ode.js
windows7-x64
3Resubmissions
02/09/2024, 21:14
240902-z3rgpsxcnm 902/09/2024, 21:08
240902-zyvnkaxbqj 902/09/2024, 20:57
240902-zrx54sxapk 902/09/2024, 20:52
240902-znsffsxajm 9Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/09/2024, 20:52
Static task
static1
Behavioral task
behavioral1
Sample
CampPinecrest.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
CampPinecrest.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/app-64.7z
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/app-64.7z
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
LICENSES.chromium.html
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
LICENSES.chromium.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
WorldWars.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
WorldWars.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
d3dcompiler_47.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
ffmpeg.dll
Resource
win7-20240704-en
Behavioral task
behavioral19
Sample
ffmpeg.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral20
Sample
libEGL.dll
Resource
win7-20240708-en
Behavioral task
behavioral21
Sample
libEGL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral22
Sample
libGLESv2.dll
Resource
win7-20240729-en
Behavioral task
behavioral23
Sample
libGLESv2.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral24
Sample
locales/af.ps1
Resource
win7-20240704-en
Behavioral task
behavioral25
Sample
locales/af.ps1
Resource
win10v2004-20240802-en
Behavioral task
behavioral26
Sample
locales/uk.ps1
Resource
win7-20240705-en
Behavioral task
behavioral27
Sample
locales/uk.ps1
Resource
win10v2004-20240802-en
Behavioral task
behavioral28
Sample
resources/app.asar.unpacked/node_modules/hbo-dnsd/constants.js
Resource
win7-20240704-en
Behavioral task
behavioral29
Sample
resources/app.asar.unpacked/node_modules/hbo-dnsd/constants.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral30
Sample
resources/app.asar.unpacked/node_modules/hbo-dnsd/convenient.js
Resource
win7-20240704-en
Behavioral task
behavioral31
Sample
resources/app.asar.unpacked/node_modules/hbo-dnsd/convenient.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral32
Sample
resources/app.asar.unpacked/node_modules/hbo-dnsd/encode.js
Resource
win7-20240708-en
General
-
Target
WorldWars.exe
-
Size
154.6MB
-
MD5
225cd570d533705a6798559e90ed99d9
-
SHA1
dadf3eccaf2b6c7183128941e3b854b8e6f21cec
-
SHA256
b4f796f1cd929e6da285b3469f8ad9a2ae9ef4d383295abf0a746bf053ea4c0e
-
SHA512
67aefd4d858caacf7129671081cf8eae9762a5e27cf63832226da7a25f9aac3b3c19a8b4d9cd3216b6565f066259c2d7dadc86d9ca1277b659d9351054759405
-
SSDEEP
1572864:ITmw0ciLNpDPuAvHxJLkY2O6Ea3f9kwZXeT6EivLp1vUAtdjtZn+f4FnIvGaC9dU:7v6E70+Mk
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation cscript.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation t4bc9u73ykm.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation WorldWars.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\t4bc9u73ykm.lnk cscript.exe -
Executes dropped EXE 2 IoCs
pid Process 2428 t4bc9u73ykm.exe 1232 screenCapture_1.3.2.exe -
Loads dropped DLL 2 IoCs
pid Process 1564 WorldWars.exe 1564 WorldWars.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates processes with tasklist 1 TTPs 5 IoCs
pid Process 2376 tasklist.exe 720 tasklist.exe 1936 tasklist.exe 912 tasklist.exe 660 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3476 WorldWars.exe 3476 WorldWars.exe 4648 WorldWars.exe 4648 WorldWars.exe 4648 WorldWars.exe 4648 WorldWars.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 980 WMIC.exe Token: SeSecurityPrivilege 980 WMIC.exe Token: SeTakeOwnershipPrivilege 980 WMIC.exe Token: SeLoadDriverPrivilege 980 WMIC.exe Token: SeSystemProfilePrivilege 980 WMIC.exe Token: SeSystemtimePrivilege 980 WMIC.exe Token: SeProfSingleProcessPrivilege 980 WMIC.exe Token: SeIncBasePriorityPrivilege 980 WMIC.exe Token: SeCreatePagefilePrivilege 980 WMIC.exe Token: SeBackupPrivilege 980 WMIC.exe Token: SeRestorePrivilege 980 WMIC.exe Token: SeShutdownPrivilege 980 WMIC.exe Token: SeDebugPrivilege 980 WMIC.exe Token: SeSystemEnvironmentPrivilege 980 WMIC.exe Token: SeRemoteShutdownPrivilege 980 WMIC.exe Token: SeUndockPrivilege 980 WMIC.exe Token: SeManageVolumePrivilege 980 WMIC.exe Token: 33 980 WMIC.exe Token: 34 980 WMIC.exe Token: 35 980 WMIC.exe Token: 36 980 WMIC.exe Token: SeIncreaseQuotaPrivilege 980 WMIC.exe Token: SeSecurityPrivilege 980 WMIC.exe Token: SeTakeOwnershipPrivilege 980 WMIC.exe Token: SeLoadDriverPrivilege 980 WMIC.exe Token: SeSystemProfilePrivilege 980 WMIC.exe Token: SeSystemtimePrivilege 980 WMIC.exe Token: SeProfSingleProcessPrivilege 980 WMIC.exe Token: SeIncBasePriorityPrivilege 980 WMIC.exe Token: SeCreatePagefilePrivilege 980 WMIC.exe Token: SeBackupPrivilege 980 WMIC.exe Token: SeRestorePrivilege 980 WMIC.exe Token: SeShutdownPrivilege 980 WMIC.exe Token: SeDebugPrivilege 980 WMIC.exe Token: SeSystemEnvironmentPrivilege 980 WMIC.exe Token: SeRemoteShutdownPrivilege 980 WMIC.exe Token: SeUndockPrivilege 980 WMIC.exe Token: SeManageVolumePrivilege 980 WMIC.exe Token: 33 980 WMIC.exe Token: 34 980 WMIC.exe Token: 35 980 WMIC.exe Token: 36 980 WMIC.exe Token: SeShutdownPrivilege 1564 WorldWars.exe Token: SeCreatePagefilePrivilege 1564 WorldWars.exe Token: SeDebugPrivilege 660 tasklist.exe Token: SeDebugPrivilege 2376 tasklist.exe Token: SeDebugPrivilege 720 tasklist.exe Token: SeShutdownPrivilege 1564 WorldWars.exe Token: SeCreatePagefilePrivilege 1564 WorldWars.exe Token: SeDebugPrivilege 1936 tasklist.exe Token: SeDebugPrivilege 912 tasklist.exe Token: SeShutdownPrivilege 1564 WorldWars.exe Token: SeCreatePagefilePrivilege 1564 WorldWars.exe Token: SeShutdownPrivilege 1564 WorldWars.exe Token: SeCreatePagefilePrivilege 1564 WorldWars.exe Token: SeShutdownPrivilege 1564 WorldWars.exe Token: SeCreatePagefilePrivilege 1564 WorldWars.exe Token: SeShutdownPrivilege 1564 WorldWars.exe Token: SeCreatePagefilePrivilege 1564 WorldWars.exe Token: SeShutdownPrivilege 1564 WorldWars.exe Token: SeCreatePagefilePrivilege 1564 WorldWars.exe Token: SeShutdownPrivilege 1564 WorldWars.exe Token: SeCreatePagefilePrivilege 1564 WorldWars.exe Token: SeShutdownPrivilege 1564 WorldWars.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1564 wrote to memory of 1952 1564 WorldWars.exe 88 PID 1564 wrote to memory of 1952 1564 WorldWars.exe 88 PID 1952 wrote to memory of 980 1952 cmd.exe 90 PID 1952 wrote to memory of 980 1952 cmd.exe 90 PID 1564 wrote to memory of 3608 1564 WorldWars.exe 91 PID 1564 wrote to memory of 3608 1564 WorldWars.exe 91 PID 1564 wrote to memory of 1820 1564 WorldWars.exe 92 PID 1564 wrote to memory of 1820 1564 WorldWars.exe 92 PID 1820 wrote to memory of 2376 1820 cmd.exe 96 PID 1820 wrote to memory of 2376 1820 cmd.exe 96 PID 3608 wrote to memory of 660 3608 cmd.exe 95 PID 3608 wrote to memory of 660 3608 cmd.exe 95 PID 1564 wrote to memory of 5000 1564 WorldWars.exe 97 PID 1564 wrote to memory of 5000 1564 WorldWars.exe 97 PID 1564 wrote to memory of 5000 1564 WorldWars.exe 97 PID 1564 wrote to memory of 5000 1564 WorldWars.exe 97 PID 1564 wrote to memory of 5000 1564 WorldWars.exe 97 PID 1564 wrote to memory of 5000 1564 WorldWars.exe 97 PID 1564 wrote to memory of 5000 1564 WorldWars.exe 97 PID 1564 wrote to memory of 5000 1564 WorldWars.exe 97 PID 1564 wrote to memory of 5000 1564 WorldWars.exe 97 PID 1564 wrote to memory of 5000 1564 WorldWars.exe 97 PID 1564 wrote to memory of 5000 1564 WorldWars.exe 97 PID 1564 wrote to memory of 5000 1564 WorldWars.exe 97 PID 1564 wrote to memory of 5000 1564 WorldWars.exe 97 PID 1564 wrote to memory of 5000 1564 WorldWars.exe 97 PID 1564 wrote to memory of 5000 1564 WorldWars.exe 97 PID 1564 wrote to memory of 5000 1564 WorldWars.exe 97 PID 1564 wrote to memory of 5000 1564 WorldWars.exe 97 PID 1564 wrote to memory of 5000 1564 WorldWars.exe 97 PID 1564 wrote to memory of 5000 1564 WorldWars.exe 97 PID 1564 wrote to memory of 5000 1564 WorldWars.exe 97 PID 1564 wrote to memory of 5000 1564 WorldWars.exe 97 PID 1564 wrote to memory of 5000 1564 WorldWars.exe 97 PID 1564 wrote to memory of 5000 1564 WorldWars.exe 97 PID 1564 wrote to memory of 5000 1564 WorldWars.exe 97 PID 1564 wrote to memory of 5000 1564 WorldWars.exe 97 PID 1564 wrote to memory of 5000 1564 WorldWars.exe 97 PID 1564 wrote to memory of 5000 1564 WorldWars.exe 97 PID 1564 wrote to memory of 5000 1564 WorldWars.exe 97 PID 1564 wrote to memory of 5000 1564 WorldWars.exe 97 PID 1564 wrote to memory of 5000 1564 WorldWars.exe 97 PID 1564 wrote to memory of 5000 1564 WorldWars.exe 97 PID 1564 wrote to memory of 3476 1564 WorldWars.exe 98 PID 1564 wrote to memory of 3476 1564 WorldWars.exe 98 PID 1564 wrote to memory of 2716 1564 WorldWars.exe 99 PID 1564 wrote to memory of 2716 1564 WorldWars.exe 99 PID 2716 wrote to memory of 720 2716 cmd.exe 101 PID 2716 wrote to memory of 720 2716 cmd.exe 101 PID 1564 wrote to memory of 2036 1564 WorldWars.exe 103 PID 1564 wrote to memory of 2036 1564 WorldWars.exe 103 PID 2036 wrote to memory of 2724 2036 cmd.exe 105 PID 2036 wrote to memory of 2724 2036 cmd.exe 105 PID 1564 wrote to memory of 1600 1564 WorldWars.exe 106 PID 1564 wrote to memory of 1600 1564 WorldWars.exe 106 PID 1600 wrote to memory of 2472 1600 cmd.exe 108 PID 1600 wrote to memory of 2472 1600 cmd.exe 108 PID 1564 wrote to memory of 764 1564 WorldWars.exe 109 PID 1564 wrote to memory of 764 1564 WorldWars.exe 109 PID 764 wrote to memory of 1936 764 cmd.exe 111 PID 764 wrote to memory of 1936 764 cmd.exe 111 PID 1564 wrote to memory of 4056 1564 WorldWars.exe 112 PID 1564 wrote to memory of 4056 1564 WorldWars.exe 112 PID 4056 wrote to memory of 912 4056 cmd.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\WorldWars.exe"C:\Users\Admin\AppData\Local\Temp\WorldWars.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic csproduct get uuid"2⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:980
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"2⤵
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:660
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"2⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2376
-
-
-
C:\Users\Admin\AppData\Local\Temp\WorldWars.exe"C:\Users\Admin\AppData\Local\Temp\WorldWars.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\unitygame-setup" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1920 --field-trial-handle=1924,i,17279179128819013800,5669178612517826145,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:22⤵PID:5000
-
-
C:\Users\Admin\AppData\Local\Temp\WorldWars.exe"C:\Users\Admin\AppData\Local\Temp\WorldWars.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\unitygame-setup" --mojo-platform-channel-handle=2104 --field-trial-handle=1924,i,17279179128819013800,5669178612517826145,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3476
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"2⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:720
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "where /r . *.sqlite"2⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\system32\where.exewhere /r . *.sqlite3⤵PID:2724
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "where /r . cookies.sqlite"2⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\system32\where.exewhere /r . cookies.sqlite3⤵PID:2472
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"2⤵
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"2⤵
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:912
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "cscript //B "C:\Users\Admin\AppData\Local\Temp\add_to_startup.vbs""2⤵PID:3964
-
C:\Windows\system32\cscript.execscript //B "C:\Users\Admin\AppData\Local\Temp\add_to_startup.vbs"3⤵
- Checks computer location settings
- Drops startup file
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\t4bc9u73ykm.exe"C:\Users\Admin\AppData\Local\Temp\t4bc9u73ykm.exe" HXN-LIFETIME-7CE535B2D630 discord4⤵
- Checks computer location settings
- Executes dropped EXE
PID:2428 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "%windir%\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid"5⤵PID:2360
-
C:\Windows\System32\reg.exeC:\Windows\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid6⤵PID:1452
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\202482-2428-r72b5f.72nbf.png" "5⤵PID:3196
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe /nologo /r:"Microsoft.VisualBasic.dll" /win32manifest:"app.manifest" /out:"screenCapture_1.3.2.exe" "C:\Users\Admin\AppData\Local\Temp\SCREEN~1\SCREEN~1.BAT"6⤵
- System Location Discovery: System Language Discovery
PID:3148 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2362.tmp" "c:\Users\Admin\AppData\Local\Temp\screenCapture\CSCDEEB09CBCB654EA9B4DD70CBF5689F25.TMP"7⤵
- System Location Discovery: System Language Discovery
PID:3056
-
-
-
C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exescreenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\202482-2428-r72b5f.72nbf.png"6⤵
- Executes dropped EXE
PID:1232
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\WorldWars.exe"C:\Users\Admin\AppData\Local\Temp\WorldWars.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\unitygame-setup" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1896 --field-trial-handle=1924,i,17279179128819013800,5669178612517826145,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4648
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
424KB
MD5e3c04448099f8cbaf4f782281d8bd0f0
SHA1c5b823618fcb4389c9180fbf20f7cc3ad57fb0c9
SHA256788e52842c7c6ae83b25ac5cd917ff3a459f054a9974dfaa56a826469bb83339
SHA512eb0cf7d37c1bef23160452f6337129d710da38e362c8b230e65b923c21bc02e1612babb1f88c9267d4d3a05a957aa9065183ca4a9c7a2dc260254bc30ea8508c
-
Filesize
137KB
MD504bfbfec8db966420fe4c7b85ebb506a
SHA1939bb742a354a92e1dcd3661a62d69e48030a335
SHA256da2172ce055fa47d6a0ea1c90654f530abed33f69a74d52fab06c4c7653b48fd
SHA5124ea97a9a120ed5bee8638e0a69561c2159fc3769062d7102167b0e92b4f1a5c002a761bd104282425f6cee8d0e39dbe7e12ad4e4a38570c3f90f31b65072dd65
-
Filesize
1KB
MD572ca77cd17a97a69d869af1ea362602d
SHA118487aad3251db9f523f2aef428c19062f3525af
SHA256495a862f7e157c5b817fa23436bab12dda38746f37663240b2e5298ef865a513
SHA512c5edffccaa80198d20d5666f8cc5a3650ee6c791af730275b8c79573bec095f96779810bad198d58c7c2cfe5085d471d26618dcaa14ebd9593035a6bc3db8d8b
-
Filesize
640B
MD56546c56eb0a8cee90a3acb8d1959c884
SHA101bd0bfb16eb1c5c8f54ccc7ae7259d0024097c9
SHA256170094def2db5fd093121523a8c7dd31bb8e7e7043cbcec923d92a92b9e7017c
SHA512fc534b386f677893150131fdbc505bcdc6a0a1df4fa6ccff2045cfee427c0d723cf95512dc10f4245ce77343ceb38cbb7c33fe450ea4e70357c22cd3412a3ff5
-
Filesize
1.4MB
MD556192831a7f808874207ba593f464415
SHA1e0c18c72a62692d856da1f8988b0bc9c8088d2aa
SHA2566aa8763714aa5199a4065259af792292c2a7d6a2c381aa27007255421e5c9d8c
SHA512c82aa1ef569c232b4b4f98a3789f2390e5f7bf5cc7e73d199fe23a3f636817edfdc2fb49ce7f69169c028a9dd5ab9f63e8f64964bb22424fc08db71e85054a33
-
Filesize
13KB
MD5da0f40d84d72ae3e9324ad9a040a2e58
SHA14ca7f6f90fb67dce8470b67010aa19aa0fd6253f
SHA256818350a4fb4146072a25f0467c5c99571c854d58bec30330e7db343bceca008b
SHA51230b7d4921f39c2601d94a3e3bb0e3be79b4b7b505e52523d2562f2e2f32154d555a593df87a71cddb61b98403265f42e0d6705950b37a155dc1d64113c719fd9
-
Filesize
12KB
MD5338575dd29e803d734d32df2341ca4a8
SHA111ee9299d53d0504e940b7debf2a2182e6359e8f
SHA2565ec7a8e77304bab0aa34f12f9f7e49a2f4f505021c3ea83e083bba302f1951a5
SHA5124a1d5fd633bc5acbcfec5e169966f128c7c556b2225ecf108d816498b196c1e77281df9d0a59ddc57b6107596e53b2b0e8b00dcba3244f1aa331ffa794f215c9
-
Filesize
1KB
MD5a6f2d21624678f54a2abed46e9f3ab17
SHA1a2a6f07684c79719007d434cbd1cd2164565734a
SHA256ab96911d094b6070cbfb48e07407371ddb41b86e36628b6a10cdb11478192344
SHA5120b286df41c3887eecff5c38cbd6818078313b555ef001151b41ac11b80466b2f4f39da518ab9c51eeff35295cb39d52824de13e026c35270917d7274f764c676
-
Filesize
350B
MD58951565428aa6644f1505edb592ab38f
SHA19c4bee78e7338f4f8b2c8b6c0e187f43cfe88bf2
SHA2568814db9e125d0c2b7489f8c7c3e95adf41f992d4397ed718bda8573cb8fb0e83
SHA5127577bad37b67bf13a0d7f9b8b7d6c077ecdfb81a5bee94e06dc99e84cb20db2d568f74d1bb2cef906470b4f6859e00214beacca7d82e2b99126d27820bf3b8f5