Overview
overview
7Static
static
323c707f9cc...1N.exe
windows7-x64
723c707f9cc...1N.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$TEMP/VVSNInst.exe
windows7-x64
7$TEMP/VVSNInst.exe
windows10-2004-x64
7$WINDIR/Sy...ms.dll
windows7-x64
3$WINDIR/Sy...ms.dll
windows10-2004-x64
3$WINDIR/Sy...ax.dll
windows7-x64
3$WINDIR/Sy...ax.dll
windows10-2004-x64
3Arcade!.exe
windows7-x64
3Arcade!.exe
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7Analysis
-
max time kernel
107s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 23:55
Static task
static1
Behavioral task
behavioral1
Sample
23c707f9cc1a222d593738b5fcaf9d06da19104b83be91788c879f134800a851N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
23c707f9cc1a222d593738b5fcaf9d06da19104b83be91788c879f134800a851N.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$TEMP/VVSNInst.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$TEMP/VVSNInst.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$WINDIR/System32/dsaoms.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$WINDIR/System32/dsaoms.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral11
Sample
$WINDIR/System32/wkcajax.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$WINDIR/System32/wkcajax.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Arcade!.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Arcade!.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
uninst.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
uninst.exe
Resource
win10v2004-20240802-en
General
-
Target
uninst.exe
-
Size
41KB
-
MD5
3ffe03fe0a494a88b37618bc40db695f
-
SHA1
a89eb3ea7954941fffa3e1f76b46818d06ffc902
-
SHA256
f5c4717f5c2b20c14403633d7faa42469a33ec61131578b1998d240c85fadb76
-
SHA512
667682dcf6bcf2b0fe842bf93d9dad81dec68ca38313bf2fc86c57c2e483ab2301d0ad2b7fb8d3c1de26d6a3bfc2cd6efe3a61d9529cec3d37b3526687ca761c
-
SSDEEP
768:KTDou/K2XYplvXh3eRMWpn2yJtKALOxqQo+JeCcFRHtqkkJVb/gyKFm:iWbXhuGWZzJkAKqQxenkJVzgysm
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3176 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 3176 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral16/files/0x00070000000234bc-5.dat nsis_installer_1 -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2336 msedge.exe 2336 msedge.exe 1968 msedge.exe 1968 msedge.exe 3632 identity_helper.exe 3632 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1068 wrote to memory of 3176 1068 uninst.exe 82 PID 1068 wrote to memory of 3176 1068 uninst.exe 82 PID 1068 wrote to memory of 3176 1068 uninst.exe 82 PID 3176 wrote to memory of 1968 3176 Au_.exe 83 PID 3176 wrote to memory of 1968 3176 Au_.exe 83 PID 1968 wrote to memory of 4812 1968 msedge.exe 84 PID 1968 wrote to memory of 4812 1968 msedge.exe 84 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 5032 1968 msedge.exe 85 PID 1968 wrote to memory of 2336 1968 msedge.exe 86 PID 1968 wrote to memory of 2336 1968 msedge.exe 86 PID 1968 wrote to memory of 3240 1968 msedge.exe 87 PID 1968 wrote to memory of 3240 1968 msedge.exe 87 PID 1968 wrote to memory of 3240 1968 msedge.exe 87 PID 1968 wrote to memory of 3240 1968 msedge.exe 87 PID 1968 wrote to memory of 3240 1968 msedge.exe 87 PID 1968 wrote to memory of 3240 1968 msedge.exe 87 PID 1968 wrote to memory of 3240 1968 msedge.exe 87 PID 1968 wrote to memory of 3240 1968 msedge.exe 87 PID 1968 wrote to memory of 3240 1968 msedge.exe 87 PID 1968 wrote to memory of 3240 1968 msedge.exe 87 PID 1968 wrote to memory of 3240 1968 msedge.exe 87 PID 1968 wrote to memory of 3240 1968 msedge.exe 87 PID 1968 wrote to memory of 3240 1968 msedge.exe 87 PID 1968 wrote to memory of 3240 1968 msedge.exe 87 PID 1968 wrote to memory of 3240 1968 msedge.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.openwares.org/unindex.php?app=Arcade Classic Arcade Pack3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0xdc,0x104,0xd8,0x108,0x7ffe741446f8,0x7ffe74144708,0x7ffe741447184⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,2523998614743515599,8724753547624137653,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:24⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,2523998614743515599,8724753547624137653,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,2523998614743515599,8724753547624137653,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:84⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,2523998614743515599,8724753547624137653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:14⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,2523998614743515599,8724753547624137653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:14⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,2523998614743515599,8724753547624137653,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:84⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,2523998614743515599,8724753547624137653,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,2523998614743515599,8724753547624137653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:14⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,2523998614743515599,8724753547624137653,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:14⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,2523998614743515599,8724753547624137653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:14⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,2523998614743515599,8724753547624137653,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:14⤵PID:2656
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5185679b80508d864e36c666ca872c6b9
SHA199064af805b8913b5a6702ea25c38fe9c05a21ac
SHA25640792a8c24a755b7ba12ccaab15a87c127b9495b3295838b7dd9af4de67621cd
SHA5128cab8720581e87a2c7faf95baf3e5df5619d98dbe2ae64a11dd12a51d63c05c6c1bcab3284a8b4ef74559ae1366a4ba091e43254fd15cc176926c4f1e07974fa
-
Filesize
5KB
MD51aabe39900f7c900d908fd9a6953f219
SHA1629264c1889196bcd4cdc1c52505801b21efd407
SHA2569ca459ddc531dba3ad06896c20ee6c82e9698693ecebcaef2a471c153a6ae49a
SHA512e7a276096123572034557ba2d80c67772f436fcce09058da589abbd27eaac605925c481531116215ed4407c3606c2a39d5070c202237eeb9513a92aa6c76c8ae
-
Filesize
6KB
MD56cc505a955f224e8ca6db00a00e173ce
SHA154c38f8f9b00b7bdd56a179f98eae5d1542550dc
SHA256bf9fcddd59b1dcfc668ad488786410b8ac6827322cb0994ec559276ea097c840
SHA5122e6d7b37621a74c81bea1769cfa17dde7b38fe1221988f68484e83fe34a238e7c188eff998df9cc5e62bc057033b56d1ef5ce0c79fff347b86f92b2be9e1adbc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c42cf1ce980654bdb6de3eb5f343a83a
SHA1627a69756a9087ce4fb6834f7ca9afac3a95e2e6
SHA25625f2a602ddfc3077c594b283b938f6494e0a055d6c377f8239dbc98d0359a5e3
SHA51249259acebc2aa03c59856230948ca977ecb190bb9469c8571c1840a541309fb350ed477bdca5ae6b1fba7d0563b0361a717ac86d7a82e4dd4554c8679068228d
-
Filesize
41KB
MD53ffe03fe0a494a88b37618bc40db695f
SHA1a89eb3ea7954941fffa3e1f76b46818d06ffc902
SHA256f5c4717f5c2b20c14403633d7faa42469a33ec61131578b1998d240c85fadb76
SHA512667682dcf6bcf2b0fe842bf93d9dad81dec68ca38313bf2fc86c57c2e483ab2301d0ad2b7fb8d3c1de26d6a3bfc2cd6efe3a61d9529cec3d37b3526687ca761c