Overview
overview
7Static
static
7kxddzmfb/PlayGame.exe
windows7-x64
7kxddzmfb/PlayGame.exe
windows10-2004-x64
7kxddzmfb/�...��.url
windows7-x64
1kxddzmfb/�...��.url
windows10-2004-x64
1kxddzmfb/�...��.exe
windows7-x64
1kxddzmfb/�...��.exe
windows10-2004-x64
3kxddzmfb/�...��.url
windows7-x64
1kxddzmfb/�...��.url
windows10-2004-x64
1安装程序.exe
windows7-x64
7安装程序.exe
windows10-2004-x64
7Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 20:43
Behavioral task
behavioral1
Sample
kxddzmfb/PlayGame.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
kxddzmfb/PlayGame.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
kxddzmfb/开心斗地主 V2.6 免费版.url
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
kxddzmfb/开心斗地主 V2.6 免费版.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
kxddzmfb/开心斗地主.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
kxddzmfb/开心斗地主.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
kxddzmfb/开心斗地主.url
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
kxddzmfb/开心斗地主.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
安装程序.exe
Resource
win7-20240903-en
General
-
Target
kxddzmfb/PlayGame.exe
-
Size
2.4MB
-
MD5
ac64a4f2426a765c35e82ca6a82a410f
-
SHA1
592eac781e50844db658acbff3868290bf5611b7
-
SHA256
81667874b90ba0d18ec480aaa21e950ff51991195b7808042c29055b501c638d
-
SHA512
27e09e34f8a4df2b098695630095d299cb73dfa39501c9746108508dde3675551a19c9ecc4e4ca65fc9231e38f2c651968d4919446e5fd038375676890203a9d
-
SSDEEP
49152:BO5oWaKv+hyz8grnkQfKEUSKwmsDExssYDcv2p8:BEv7z8iCUD6Mc2i
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2848 PlayGame.exe 2848 PlayGame.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PlayGame.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main PlayGame.exe -
Modifies registry class 38 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D9B96DE9-1158-41B6-B611-6AE96B2C44D9} PlayGame.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D9B96DE9-1158-41B6-B611-6AE96B2C44D9}\ = "ITaaaa" PlayGame.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D9B96DE9-1158-41B6-B611-6AE96B2C44D9}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" PlayGame.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E61F1335-6EFE-4A33-86C1-D1505D96E624}\TypeLib\Version = "1.0" PlayGame.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{91F22F3C-B0D7-4777-A439-E0709A01D50B}\1.0\0\win32 PlayGame.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D9B96DE9-1158-41B6-B611-6AE96B2C44D9} PlayGame.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D9B96DE9-1158-41B6-B611-6AE96B2C44D9}\ = "ITaaaa" PlayGame.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E61F1335-6EFE-4A33-86C1-D1505D96E624}\TypeLib\Version = "1.0" PlayGame.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E61F1335-6EFE-4A33-86C1-D1505D96E624}\TypeLib\ = "{91F22F3C-B0D7-4777-A439-E0709A01D50B}" PlayGame.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{91F22F3C-B0D7-4777-A439-E0709A01D50B}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kxddzmfb\\PlayGame.exe" PlayGame.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D9B96DE9-1158-41B6-B611-6AE96B2C44D9}\ProxyStubClsid32 PlayGame.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E61F1335-6EFE-4A33-86C1-D1505D96E624}\TypeLib PlayGame.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E61F1335-6EFE-4A33-86C1-D1505D96E624}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" PlayGame.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D9B96DE9-1158-41B6-B611-6AE96B2C44D9}\TypeLib\ = "{91F22F3C-B0D7-4777-A439-E0709A01D50B}" PlayGame.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E61F1335-6EFE-4A33-86C1-D1505D96E624}\ = "IMyClose" PlayGame.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E61F1335-6EFE-4A33-86C1-D1505D96E624}\ProxyStubClsid32 PlayGame.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{91F22F3C-B0D7-4777-A439-E0709A01D50B}\1.0\0 PlayGame.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{91F22F3C-B0D7-4777-A439-E0709A01D50B}\1.0\HELPDIR PlayGame.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D9B96DE9-1158-41B6-B611-6AE96B2C44D9}\TypeLib\Version = "1.0" PlayGame.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D9B96DE9-1158-41B6-B611-6AE96B2C44D9}\ProxyStubClsid32 PlayGame.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E61F1335-6EFE-4A33-86C1-D1505D96E624}\ = "IMyClose" PlayGame.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{91F22F3C-B0D7-4777-A439-E0709A01D50B} PlayGame.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{91F22F3C-B0D7-4777-A439-E0709A01D50B}\1.0\FLAGS\ = "0" PlayGame.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D9B96DE9-1158-41B6-B611-6AE96B2C44D9}\TypeLib PlayGame.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D9B96DE9-1158-41B6-B611-6AE96B2C44D9}\TypeLib\Version = "1.0" PlayGame.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E61F1335-6EFE-4A33-86C1-D1505D96E624} PlayGame.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E61F1335-6EFE-4A33-86C1-D1505D96E624}\ProxyStubClsid32 PlayGame.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E61F1335-6EFE-4A33-86C1-D1505D96E624}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" PlayGame.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E61F1335-6EFE-4A33-86C1-D1505D96E624}\TypeLib\ = "{91F22F3C-B0D7-4777-A439-E0709A01D50B}" PlayGame.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{91F22F3C-B0D7-4777-A439-E0709A01D50B}\1.0\ = "StartGame Library" PlayGame.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{91F22F3C-B0D7-4777-A439-E0709A01D50B}\1.0\FLAGS PlayGame.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{91F22F3C-B0D7-4777-A439-E0709A01D50B}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kxddzmfb\\" PlayGame.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D9B96DE9-1158-41B6-B611-6AE96B2C44D9}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" PlayGame.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E61F1335-6EFE-4A33-86C1-D1505D96E624} PlayGame.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E61F1335-6EFE-4A33-86C1-D1505D96E624}\TypeLib PlayGame.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{91F22F3C-B0D7-4777-A439-E0709A01D50B}\1.0 PlayGame.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D9B96DE9-1158-41B6-B611-6AE96B2C44D9}\TypeLib PlayGame.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D9B96DE9-1158-41B6-B611-6AE96B2C44D9}\TypeLib\ = "{91F22F3C-B0D7-4777-A439-E0709A01D50B}" PlayGame.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 444 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 444 AUDIODG.EXE Token: 33 444 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 444 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2848 PlayGame.exe 2848 PlayGame.exe 2848 PlayGame.exe 2848 PlayGame.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\kxddzmfb\PlayGame.exe"C:\Users\Admin\AppData\Local\Temp\kxddzmfb\PlayGame.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2848
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5701⤵
- Suspicious use of AdjustPrivilegeToken
PID:444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UQFHO95Z\load[1]
Filesize68KB
MD54cd4b704684bd716725a7100fac7f672
SHA150f49f765bb1fa096fac2554dee5294d7ae707dd
SHA2567530c8d6745b2af45b321140bcfbea973786976906a1f5285bbebba9b924aeb8
SHA5123d694f98773139d2a4394a71047c9941bfe1b8b4f7a06d9d854dccadef8c8dab59e3e00d48d80cba1919044e9d6a9a3053ceb139bc30da48b11dc906c527bd8a
-
Filesize
457B
MD55b298bcfeb6e0df862ab0c3040165b72
SHA1666b02be6e4d9597773ea8df1a4e1a4fe1f3c0b9
SHA2564c403beb04c21e1ea7001029498846ac6c1b45e98f1a29061849d82ceebdfcd0
SHA512043675db077056cf30274213d3c56ddbffdee600ceee862c08674a6dbe6890d24351e7640ae889ff969baa89af4add754c8ca8e059a66692c176fe3d1fe63e36
-
Filesize
263KB
MD582ccb4dd63833063abd1c56ea80b529a
SHA1bd89dae631cb68e5fa0c53accc83881f7cd365b3
SHA256e3dccccc8f63981e528b0823a149f234bfd7cb56a23618f5004e379f8ada7183
SHA512c908c553b7b9b7053c5938e20fe3ff97591097c3237554da3197b4d078b24cd12a5bb01597347652c422aaa920e86dc38a3776b96a6cfd46222798a3f8036867
-
Filesize
276KB
MD53c9ec661f20ee6ca4bb17cfe7c0a5174
SHA19b9cbfe0e640d7e97c9c6caa5eb5fa9160cfcfe3
SHA25671fd49b5c6af695e92eea36794025fca1b629cba62be6a5cdaf37648dd412c98
SHA5122eebe718992a392c9a57a99cd3414e3a52fd14f06d52974d7700d57d9cf6dffafe80061f6f872edd4173982eabb95abbd99694760ce3fb35377513a8cf13ca5a