Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-10-2024 00:58
Static task
static1
Behavioral task
behavioral1
Sample
MW3_Unlocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
MW3_Unlocker.exe
Resource
win10v2004-20241007-en
General
-
Target
MW3_Unlocker.exe
-
Size
4.9MB
-
MD5
d6490e5a89108caecb7717db256e9b78
-
SHA1
7e734eb9626ae2cf21383fb718e54006f34e5a10
-
SHA256
0a44244f435457680e7026b969db56ea09a8748e6dbfe0b51bc184045798810f
-
SHA512
c050c69e2a4f40d97ff732c43ef960ce687c8289acdba4eb676c499d95e2f207376e54413d74af39e4b9d615cf89ff7703f33580f553a06e04ad419408e2e0ef
-
SSDEEP
98304:FkB3z2lHQTUC9IyzD09xXSp+8RikRGAGO9dku6Rp1JEy:DJEUC9Iy/EdSseiTA79dL8E
Malware Config
Extracted
stealc
game
http://193.233.112.44
-
url_path
/383ccd496f3c5eee.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ VC_redistx64.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion VC_redistx64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion VC_redistx64.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\International\Geo\Nation VC_redistx64.exe -
Executes dropped EXE 3 IoCs
pid Process 2940 gWsmPty.exe 3060 VC_redistx64.exe 2432 MW3_Unlocker.exe -
Loads dropped DLL 3 IoCs
pid Process 2500 WerFault.exe 2500 WerFault.exe 2500 WerFault.exe -
resource yara_rule behavioral1/files/0x0008000000014c66-20.dat themida behavioral1/memory/3060-21-0x0000000000400000-0x0000000000B78000-memory.dmp themida behavioral1/memory/3060-28-0x0000000000400000-0x0000000000B78000-memory.dmp themida behavioral1/memory/3060-26-0x0000000000400000-0x0000000000B78000-memory.dmp themida behavioral1/memory/3060-32-0x0000000000400000-0x0000000000B78000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\My Program = "C:\\Users\\Admin\\AppData\\Roaming\\MyHiddenFolder\\VC_redistx64.exe" VC_redistx64.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA VC_redistx64.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3060 VC_redistx64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2500 2940 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VC_redistx64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MW3_Unlocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gWsmPty.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 gWsmPty.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString gWsmPty.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3060 VC_redistx64.exe 2432 MW3_Unlocker.exe 2432 MW3_Unlocker.exe 2940 gWsmPty.exe 2432 MW3_Unlocker.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2432 MW3_Unlocker.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2940 2400 MW3_Unlocker.exe 28 PID 2400 wrote to memory of 2940 2400 MW3_Unlocker.exe 28 PID 2400 wrote to memory of 2940 2400 MW3_Unlocker.exe 28 PID 2400 wrote to memory of 2940 2400 MW3_Unlocker.exe 28 PID 2400 wrote to memory of 3060 2400 MW3_Unlocker.exe 29 PID 2400 wrote to memory of 3060 2400 MW3_Unlocker.exe 29 PID 2400 wrote to memory of 3060 2400 MW3_Unlocker.exe 29 PID 2400 wrote to memory of 3060 2400 MW3_Unlocker.exe 29 PID 2400 wrote to memory of 2432 2400 MW3_Unlocker.exe 30 PID 2400 wrote to memory of 2432 2400 MW3_Unlocker.exe 30 PID 2400 wrote to memory of 2432 2400 MW3_Unlocker.exe 30 PID 2400 wrote to memory of 2432 2400 MW3_Unlocker.exe 30 PID 2940 wrote to memory of 2500 2940 gWsmPty.exe 34 PID 2940 wrote to memory of 2500 2940 gWsmPty.exe 34 PID 2940 wrote to memory of 2500 2940 gWsmPty.exe 34 PID 2940 wrote to memory of 2500 2940 gWsmPty.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\MW3_Unlocker.exe"C:\Users\Admin\AppData\Local\Temp\MW3_Unlocker.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Roaming\gWsmPty.exe"C:\Users\Admin\AppData\Roaming\gWsmPty.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2940 -s 8923⤵
- Loads dropped DLL
- Program crash
PID:2500
-
-
-
C:\Users\Admin\AppData\Roaming\VC_redistx64.exe"C:\Users\Admin\AppData\Roaming\VC_redistx64.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3060
-
-
C:\Users\Admin\AppData\Roaming\MW3_Unlocker.exe"C:\Users\Admin\AppData\Roaming\MW3_Unlocker.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5d5020cbdffd3291c60f57738c4ef209f
SHA17b6d3237a671f63e4b2355de88f9e713b5789d5d
SHA25635050d783ce83a7ddcb17cdb19ffb9fed0712adeee748a0c1225be630d7deba3
SHA512ece513607a7f0439888e82955a2ef8d784abdb33a5b75295b8f857d5ea4b00b4ff67ae4ccab7d457c1c2d6e8475884172bbc7f0080e555f41d1acddd15abbe54
-
Filesize
2.9MB
MD5507acc8f3249adef7468989fee931211
SHA14d66286973a21e76b0e2c746bac00fa28d446ca9
SHA2566abb77dce6d4af42005e673cb089b6d41e0ef0b88a6411f4d5dfd8e8b4858154
SHA5122faee963523b401bf1e588c86bfeef899067456f22848d299525acde5d2ce28a66f769d741deea2e6b218b4e1b0c0f7f4cc08cfc1c2fd8eac5375b3c183b7ee3
-
Filesize
322KB
MD5c57f035e099bfe7f8d56917a22266dc9
SHA188a4ab3cef2b3d293b6d94b8d5b38298d1ec6d87
SHA256d075bbba29912ff7a321ee5dcb32159b9de8e27e716a1aad9ed52bb9d9ccc4a3
SHA512836f345be084eeaef97144faa845a697f3c40a5f643088ee355d71cbedac23506c4d53267220bfa467872e850faebbc5a3919fbeb5628534619d39fbcbf1e1e4