Analysis

  • max time kernel
    140s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14/09/2024, 20:43

General

  • Target

    kxddzmfb/PlayGame.exe

  • Size

    2.4MB

  • MD5

    ac64a4f2426a765c35e82ca6a82a410f

  • SHA1

    592eac781e50844db658acbff3868290bf5611b7

  • SHA256

    81667874b90ba0d18ec480aaa21e950ff51991195b7808042c29055b501c638d

  • SHA512

    27e09e34f8a4df2b098695630095d299cb73dfa39501c9746108508dde3675551a19c9ecc4e4ca65fc9231e38f2c651968d4919446e5fd038375676890203a9d

  • SSDEEP

    49152:BO5oWaKv+hyz8grnkQfKEUSKwmsDExssYDcv2p8:BEv7z8iCUD6Mc2i

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 38 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\kxddzmfb\PlayGame.exe
    "C:\Users\Admin\AppData\Local\Temp\kxddzmfb\PlayGame.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2848
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x570
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:444

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UQFHO95Z\load[1]

    Filesize

    68KB

    MD5

    4cd4b704684bd716725a7100fac7f672

    SHA1

    50f49f765bb1fa096fac2554dee5294d7ae707dd

    SHA256

    7530c8d6745b2af45b321140bcfbea973786976906a1f5285bbebba9b924aeb8

    SHA512

    3d694f98773139d2a4394a71047c9941bfe1b8b4f7a06d9d854dccadef8c8dab59e3e00d48d80cba1919044e9d6a9a3053ceb139bc30da48b11dc906c527bd8a

  • C:\Users\Admin\AppData\Local\Temp\kxddzmfb\rungame.ini

    Filesize

    457B

    MD5

    5b298bcfeb6e0df862ab0c3040165b72

    SHA1

    666b02be6e4d9597773ea8df1a4e1a4fe1f3c0b9

    SHA256

    4c403beb04c21e1ea7001029498846ac6c1b45e98f1a29061849d82ceebdfcd0

    SHA512

    043675db077056cf30274213d3c56ddbffdee600ceee862c08674a6dbe6890d24351e7640ae889ff969baa89af4add754c8ca8e059a66692c176fe3d1fe63e36

  • \Users\Admin\AppData\Local\Temp\kxddzmfb\Greening.dll

    Filesize

    263KB

    MD5

    82ccb4dd63833063abd1c56ea80b529a

    SHA1

    bd89dae631cb68e5fa0c53accc83881f7cd365b3

    SHA256

    e3dccccc8f63981e528b0823a149f234bfd7cb56a23618f5004e379f8ada7183

    SHA512

    c908c553b7b9b7053c5938e20fe3ff97591097c3237554da3197b4d078b24cd12a5bb01597347652c422aaa920e86dc38a3776b96a6cfd46222798a3f8036867

  • \Users\Admin\AppData\Local\Temp\kxddzmfb\aqhttp.dll

    Filesize

    276KB

    MD5

    3c9ec661f20ee6ca4bb17cfe7c0a5174

    SHA1

    9b9cbfe0e640d7e97c9c6caa5eb5fa9160cfcfe3

    SHA256

    71fd49b5c6af695e92eea36794025fca1b629cba62be6a5cdaf37648dd412c98

    SHA512

    2eebe718992a392c9a57a99cd3414e3a52fd14f06d52974d7700d57d9cf6dffafe80061f6f872edd4173982eabb95abbd99694760ce3fb35377513a8cf13ca5a

  • memory/2848-27-0x0000000000400000-0x0000000000791000-memory.dmp

    Filesize

    3.6MB

  • memory/2848-28-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

    Filesize

    64KB

  • memory/2848-6-0x0000000000400000-0x0000000000791000-memory.dmp

    Filesize

    3.6MB

  • memory/2848-29-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2848-30-0x0000000000400000-0x0000000000791000-memory.dmp

    Filesize

    3.6MB

  • memory/2848-31-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

    Filesize

    64KB

  • memory/2848-33-0x0000000000400000-0x0000000000791000-memory.dmp

    Filesize

    3.6MB

  • memory/2848-61-0x0000000000400000-0x0000000000791000-memory.dmp

    Filesize

    3.6MB

  • memory/2848-7-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB