Overview
overview
7Static
static
3Undertale ...us.rar
windows7-x64
3Undertale ...us.rar
windows10-2004-x64
7D3DX9_43.dll
windows7-x64
3D3DX9_43.dll
windows10-2004-x64
3GAMESTORRENT.CO.url
windows7-x64
6GAMESTORRENT.CO.url
windows10-2004-x64
3IGG-GAMES.COM.url
windows7-x64
6IGG-GAMES.COM.url
windows10-2004-x64
3UNDERTALE.exe
windows7-x64
3UNDERTALE.exe
windows10-2004-x64
6UTES_v2.exe
windows7-x64
7UTES_v2.exe
windows10-2004-x64
7Analysis
-
max time kernel
599s -
max time network
618s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 16:33
Static task
static1
Behavioral task
behavioral1
Sample
Undertale Sin Virus.rar
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Undertale Sin Virus.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
D3DX9_43.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
D3DX9_43.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
GAMESTORRENT.CO.url
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
GAMESTORRENT.CO.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
IGG-GAMES.COM.url
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
IGG-GAMES.COM.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
UNDERTALE.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
UNDERTALE.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
UTES_v2.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
UTES_v2.exe
Resource
win10v2004-20240802-en
General
-
Target
IGG-GAMES.COM.url
-
Size
198B
-
MD5
e4aeaaca90fce67661f114822a05821c
-
SHA1
383566802ada60fa79899fafd8965787165cc9a3
-
SHA256
6626bfe6c288b998647273217e711fc913371597756601d88b4352a57215d591
-
SHA512
6c53520d70d03ef00526648fd282b83b4faa21d8784aa848682fc023df0173142403723c2e932590d53cb1ff5439b63cc20cc640333c0e646952855436c7282c
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c02a14cd3805db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000000b5ddf7e04f21011dddeaf60afde3ea644a667206d6eb1c1d15b605bb0115ea2000000000e80000000020000200000000d80e626c2a0291c53d84b80b93e7062eae1c145106cb431694ae280faf41b862000000096090bd247f0c56c035d669efdf38077d722ffe87c15b3ff66d8f6dee6ae88e6400000000e057d8c4a04f75664063f31714bb042cad8db1b10e7f539790f4128795f0e5009e489447f077d7c5fd8c30ca89749cea0452bb193cc666277df56e12dbbadcc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E87D1A61-712B-11EF-A7E8-7ED3796B1EC0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432323777" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1716 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1716 iexplore.exe 1716 iexplore.exe 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2256 1716 iexplore.exe 32 PID 1716 wrote to memory of 2256 1716 iexplore.exe 32 PID 1716 wrote to memory of 2256 1716 iexplore.exe 32 PID 1716 wrote to memory of 2256 1716 iexplore.exe 32
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\IGG-GAMES.COM.url1⤵
- Checks whether UAC is enabled
PID:2368
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1716 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2256
-