Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-09-2024 14:34

General

  • Target

    gameguard_setup.msi

  • Size

    7.7MB

  • MD5

    68bd8f9af44479db013a77c806f1c674

  • SHA1

    0cbb2b63c78b42e13b1818964bb2cf43e46c5052

  • SHA256

    ac9ac5a95273064ba09af8be049124ba52db7a59075d69a94d12427917dbc376

  • SHA512

    991f703293b984beeeda44cc72cacc0cd69bd4cb1856b2b1c5cf2a2d06d7f58e8469af70c2ecece05d98643937c52f8a944b9892e2925738457d2ac238867852

  • SSDEEP

    196608:mELpCPNYnYCCJLuMo3nmkmKf+GNI1Xjn5CD9ilxw:fLpCVY7CtuMo2kmcNmsiLw

Malware Config

Signatures

  • Blocklisted process makes network request 5 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Drops file in Windows directory 10 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 46 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\gameguard_setup.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1656
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3676
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:2520
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 6DF8E507F029E969EFE3612C5085B179 C
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3512
        • C:\Program Files (x86)\GameGuard\gameguard.exe
          "C:\Program Files (x86)\GameGuard\gameguard.exe"
          3⤵
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Program Files directory
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:2272
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:3880
    • C:\Program Files (x86)\GameGuard\acsvc.exe
      "C:\Program Files (x86)\GameGuard\acsvc.exe"
      1⤵
      • Executes dropped EXE
      PID:4844
    • C:\Program Files (x86)\GameGuard\acsvc.exe
      "C:\Program Files (x86)\GameGuard\acsvc.exe"
      1⤵
      • Drops file in Program Files directory
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:544
      • C:\Program Files (x86)\GameGuard\acsvc.exe
        "C:\Program Files (x86)\GameGuard\acsvc.exe" --run="C:\Program Files (x86)\GameGuard\gameguard.exe"
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4688
        • C:\Program Files (x86)\GameGuard\gameguard.exe
          "C:\Program Files (x86)\GameGuard\gameguard.exe"
          3⤵
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:4908

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e584a05.rbs

      Filesize

      11KB

      MD5

      fe1a169f57ad917c71a240ff99f9b147

      SHA1

      a788c256bc13137cca676c9924b8fae7931557ce

      SHA256

      fa75b9a64531539d72989d4c110867b0a15de9426a0aabb14127aaba466775bc

      SHA512

      58154b4171d066a391120cdfe875f86d09979a86352f2a799fa52dd0f77bca28528ac5edf76981c66133451e3d084dbd938a9aa00c780d228cf15bc101fa3bb8

    • C:\Program Files (x86)\GameGuard\acsvc.exe

      Filesize

      316KB

      MD5

      7ec55f85dd4740e6f146d3ee54e01201

      SHA1

      44fcf3bb83a006ab6ca90d728bec43c031e0cada

      SHA256

      7997c3e9c03c0e91b8b07cb482c97066afdd483d2dbab1f292f749f4fe97e229

      SHA512

      7b6a494b5506e249e67e63c32fe42895227ec53a49f37e9b3884f628fd7bcc29f1f8bf96d616b8b741adc48540fc8eda7e64701a459acb707569bd1e36ee143b

    • C:\Program Files (x86)\GameGuard\cache\lwskkl.cache

      Filesize

      15.3MB

      MD5

      1ac7965867072e615fea1ee20dc2300e

      SHA1

      d175990d7fe808931ee915470b130a2c37283ee8

      SHA256

      0cb8174d1aeb9bb9efa6cca18f09df5941e5f48d23240d207e15a25f20ac70fc

      SHA512

      4bdf16ff4c50d1e04dd4b9fa9cb3949c8a061bc7a2a5d86bc5cff07ad55ccafd5314a36189eb12e9164fc73b46830db5f54f553bb3d5112c0aee5dd22bb0dcf1

    • C:\Program Files (x86)\GameGuard\cache\sjdgfve.cache

      Filesize

      330KB

      MD5

      b966184ae28d7bc96756bc3ed001c701

      SHA1

      8c620632624e9bc9b3e7d7a672072bdb6952df87

      SHA256

      f2b6185392b98f27da4a7a8c74b585ae00d6e69bd7f97727dca0953aa3ab0324

      SHA512

      8b9ad0bec94ed9a44a0c8aa8b8ca1b80fc6aecc46a2d74a2eb3830394ece82a77bed121c49ccbc6fb4fb7c05edbc90c17d591c2ee0f88bd3018893bc4cd0e003

    • C:\Program Files (x86)\GameGuard\gameguard.exe

      Filesize

      7.2MB

      MD5

      81ed38976254bb646c0ecee753324027

      SHA1

      c3fe70f9daff9e66b315b2adc9481a7d39d7e7c6

      SHA256

      cf169e7a746c574f3e2ec653a6739ca71fe0e34aa76f604cd36706fe45536be7

      SHA512

      476a6f9f65857d015661dc8504c537efff00fbd69014ab2e36aeed393b69083962195b3aa6e4485aa46f7471aa59aec21a6e56a687fc6474cc7a62b9c47ca018

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\60B3F7207DEB992031C120EB71F562CD

      Filesize

      4KB

      MD5

      94bf0bf032ce32469dd74f4f1f5320e6

      SHA1

      86bff704a2f82816f346a6a374250f35743de3b0

      SHA256

      54f08bfd73dd3477610059c4a1d92723e698def0efa7ad4661584a51d9aab79b

      SHA512

      ac62c42bfe02a35739dfed5df012bb3ef1f7bdbde1f4d9dce9448812bb6d25891dbacc2591e859f644c95151bdb7179f4f8e355b81a2a38ca7afce4980a79901

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_D21903E2722B551F252C717985D24037

      Filesize

      1KB

      MD5

      004eba2a24fda787318ce19fec383d25

      SHA1

      f9e5b03ce43664c60c7937c8998d4c12165af3ca

      SHA256

      ed5bd4c2310d2d1ce382a7b847ae6468a93b019a41004820e6ce2cf75f0f8a2e

      SHA512

      fb14058d341c5d5a426a73b43f9ccf1781197972969fbf3d82b4928c14d9181a090f11d073cdd8d0eb78ab1766fa815f62fc5c5cb30bab0dcf95ab1fc7a8f4f0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DF8D319B9741B9E1EBE906AACEA5CBBA_750FF3DD16195A328CB56C56AF693E3C

      Filesize

      5B

      MD5

      5bfa51f3a417b98e7443eca90fc94703

      SHA1

      8c015d80b8a23f780bdd215dc842b0f5551f63bd

      SHA256

      bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

      SHA512

      4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\60B3F7207DEB992031C120EB71F562CD

      Filesize

      222B

      MD5

      20e3f77990ae11487f724aa97c84b0b1

      SHA1

      f76372871ccd50976eaaa17a7a18306118dd5147

      SHA256

      5f8915c289bcd32eff8f7a447f78d72d5a8754533e332cae48e64b6f8f2069ee

      SHA512

      b9beb5db4e4a2974604493c9082a0e89f4b03002c37b4b0504828c85b6c128abc5635215df7ce8cdcdd148f44a0896b145e07bad3e1221f73e16e0b70ac8e245

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_D21903E2722B551F252C717985D24037

      Filesize

      498B

      MD5

      b5845676e8717eadb3f705f41b197c03

      SHA1

      2a3e7b1805bd0c33eb80df8b6ba9b24383fb869a

      SHA256

      f11fafbc9de8bbf474229188ac9abe5ab364ff3efe14ddb61fea629fe98012f3

      SHA512

      a9f91ed29979a52e52f0ee9098321feb29978edf109bd8f37f78a58e70f3454a1aa3671ad39718ccbeca3db631fd5d8754b3f6b5e9246946d54d47eca8d5c38c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DF8D319B9741B9E1EBE906AACEA5CBBA_750FF3DD16195A328CB56C56AF693E3C

      Filesize

      448B

      MD5

      492539486c92666f6537454eb644af2d

      SHA1

      cc4937eaf714f50d90dc7a809bed497a397a23d4

      SHA256

      6742bbaf08b9a87308956698b5a2170f41b4ce56734c309d8701bcca1e963bd4

      SHA512

      b7381925a61b7be3c5e388dfd229001436172943459c92ba399ad03cf7cecc87f5413df6754051dc5d4c51ddaac56721ce74f6fb736d7edad27664de50e7c1ab

    • C:\Users\Admin\AppData\Local\Temp\MSI5D7D.tmp

      Filesize

      202KB

      MD5

      d773d9bd091e712df7560f576da53de8

      SHA1

      165cfbdce1811883360112441f7237b287cf0691

      SHA256

      e0db1804cf53ed4819ed70cb35c67680ce1a77573efded86e6dac81010ce55e7

      SHA512

      15a956090f8756a6bfdbe191fda36739b1107eada62c6cd3058218beb417bdbd2ea82be9b055f7f6eb8017394b330daff2e9824dbc9c4f137bead8e2ac0574cd

    • C:\Windows\Installer\e584a04.msi

      Filesize

      7.7MB

      MD5

      68bd8f9af44479db013a77c806f1c674

      SHA1

      0cbb2b63c78b42e13b1818964bb2cf43e46c5052

      SHA256

      ac9ac5a95273064ba09af8be049124ba52db7a59075d69a94d12427917dbc376

      SHA512

      991f703293b984beeeda44cc72cacc0cd69bd4cb1856b2b1c5cf2a2d06d7f58e8469af70c2ecece05d98643937c52f8a944b9892e2925738457d2ac238867852

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      23.7MB

      MD5

      f9e316c81c516855f495d13cac055cba

      SHA1

      6e90625f146310814bfb706af6b6e669ca98b6b4

      SHA256

      91d5dd3a3b4b65e39e617cb597075f72219a82874737786e27c1d0eaf183e00d

      SHA512

      2a6ddeca10c5f61f2c9a1eba264ec74e713c839623270ba63e4d87b1273326da507ac7ed7686a05fd85779dc593b279ab1375e722500d96530f8a46342e98d80

    • \??\Volume{f3a72b53-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{1667d4e1-7525-4eed-a9a8-0249fea2fd66}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      4c32fdb50c138e3cbc31eb26a246d0e0

      SHA1

      c6d60597c502dbb8a7d578ff623d9f37365b31f2

      SHA256

      83f917a610881d7e434eee5aa7a08b7df43477e2108bf8cb67f4cd6561068b6b

      SHA512

      146d941d21267be0def4fdc895db31a5f92f10c4a938e8c8cfa41498919dba93bcb09c0a77d8d32eae26d87f9cc9c639081269ec59672a0014c0e0a97198c9ba

    • memory/2272-88-0x0000000003320000-0x0000000003321000-memory.dmp

      Filesize

      4KB

    • memory/2272-86-0x00000000031F0000-0x00000000031F1000-memory.dmp

      Filesize

      4KB

    • memory/2272-90-0x00000000005C0000-0x000000000117E000-memory.dmp

      Filesize

      11.7MB

    • memory/2272-87-0x0000000003200000-0x0000000003201000-memory.dmp

      Filesize

      4KB

    • memory/2272-85-0x00000000031E0000-0x00000000031E1000-memory.dmp

      Filesize

      4KB

    • memory/2272-81-0x0000000003180000-0x0000000003181000-memory.dmp

      Filesize

      4KB

    • memory/2272-82-0x0000000003190000-0x0000000003191000-memory.dmp

      Filesize

      4KB

    • memory/2272-83-0x00000000031C0000-0x00000000031C1000-memory.dmp

      Filesize

      4KB

    • memory/2272-84-0x00000000031D0000-0x00000000031D1000-memory.dmp

      Filesize

      4KB

    • memory/4908-108-0x00000000020A0000-0x00000000020A1000-memory.dmp

      Filesize

      4KB

    • memory/4908-110-0x00000000021C0000-0x00000000021C1000-memory.dmp

      Filesize

      4KB

    • memory/4908-112-0x0000000003C80000-0x0000000003C81000-memory.dmp

      Filesize

      4KB

    • memory/4908-113-0x0000000003C90000-0x0000000003C91000-memory.dmp

      Filesize

      4KB

    • memory/4908-111-0x0000000003C70000-0x0000000003C71000-memory.dmp

      Filesize

      4KB

    • memory/4908-115-0x0000000003CB0000-0x0000000003CB1000-memory.dmp

      Filesize

      4KB

    • memory/4908-114-0x0000000003CA0000-0x0000000003CA1000-memory.dmp

      Filesize

      4KB

    • memory/4908-109-0x00000000020B0000-0x00000000020B1000-memory.dmp

      Filesize

      4KB

    • memory/4908-117-0x0000000000310000-0x0000000001C1C000-memory.dmp

      Filesize

      25.0MB