Analysis
-
max time kernel
136s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-11-2024 13:15
Static task
static1
Behavioral task
behavioral1
Sample
brawl-stars-gameloop-2-0-11646-123.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
brawl-stars-gameloop-2-0-11646-123.exe
Resource
win10v2004-20241007-en
General
-
Target
brawl-stars-gameloop-2-0-11646-123.exe
-
Size
9.4MB
-
MD5
f5e7ba37555932ecea7fbd874108d47e
-
SHA1
009c388a6e381f502dee72c587f553a03838436c
-
SHA256
2f6e75e0384b85cbaffbb9947cea5c1b2e4acf4952c3ab6fae919c8a965e1d43
-
SHA512
7ac31e4e877d4e7058cb7927e63d02e07272ba81c06b23c70734ed91bde435ee77effba5e8ced2dfb2480e4115a3ab735438bdb5e330e6f2c7dddde76cf30ede
-
SSDEEP
196608:hkb78tqlUgN7AktVweDO8emQmG5eWWi/zio/ia:q+2O84wWrX/
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
-
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
brawl-stars-gameloop-2-0-11646-123.exedescription ioc process File opened (read-only) \??\J: brawl-stars-gameloop-2-0-11646-123.exe File opened (read-only) \??\K: brawl-stars-gameloop-2-0-11646-123.exe File opened (read-only) \??\M: brawl-stars-gameloop-2-0-11646-123.exe File opened (read-only) \??\O: brawl-stars-gameloop-2-0-11646-123.exe File opened (read-only) \??\S: brawl-stars-gameloop-2-0-11646-123.exe File opened (read-only) \??\Y: brawl-stars-gameloop-2-0-11646-123.exe File opened (read-only) \??\E: brawl-stars-gameloop-2-0-11646-123.exe File opened (read-only) \??\I: brawl-stars-gameloop-2-0-11646-123.exe File opened (read-only) \??\P: brawl-stars-gameloop-2-0-11646-123.exe File opened (read-only) \??\Q: brawl-stars-gameloop-2-0-11646-123.exe File opened (read-only) \??\V: brawl-stars-gameloop-2-0-11646-123.exe File opened (read-only) \??\F: brawl-stars-gameloop-2-0-11646-123.exe File opened (read-only) \??\L: brawl-stars-gameloop-2-0-11646-123.exe File opened (read-only) \??\R: brawl-stars-gameloop-2-0-11646-123.exe File opened (read-only) \??\W: brawl-stars-gameloop-2-0-11646-123.exe File opened (read-only) \??\X: brawl-stars-gameloop-2-0-11646-123.exe File opened (read-only) \??\Z: brawl-stars-gameloop-2-0-11646-123.exe File opened (read-only) \??\G: brawl-stars-gameloop-2-0-11646-123.exe File opened (read-only) \??\H: brawl-stars-gameloop-2-0-11646-123.exe File opened (read-only) \??\N: brawl-stars-gameloop-2-0-11646-123.exe File opened (read-only) \??\T: brawl-stars-gameloop-2-0-11646-123.exe File opened (read-only) \??\U: brawl-stars-gameloop-2-0-11646-123.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
Netsh.exeNetsh.exepid process 2212 Netsh.exe 568 Netsh.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
brawl-stars-gameloop-2-0-11646-123.exedescription ioc process File opened for modification \??\PhysicalDrive0 brawl-stars-gameloop-2-0-11646-123.exe -
Executes dropped EXE 1 IoCs
Processes:
TenioDL.exepid process 2696 TenioDL.exe -
Loads dropped DLL 8 IoCs
Processes:
brawl-stars-gameloop-2-0-11646-123.exeTenioDL.exepid process 2440 brawl-stars-gameloop-2-0-11646-123.exe 2440 brawl-stars-gameloop-2-0-11646-123.exe 2440 brawl-stars-gameloop-2-0-11646-123.exe 2440 brawl-stars-gameloop-2-0-11646-123.exe 2440 brawl-stars-gameloop-2-0-11646-123.exe 2440 brawl-stars-gameloop-2-0-11646-123.exe 2696 TenioDL.exe 2696 TenioDL.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
Netsh.exeNetsh.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh Netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh Netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh Netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh Netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh Netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh Netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
icacls.exeNetsh.exeNetsh.exebrawl-stars-gameloop-2-0-11646-123.exeTenioDL.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language brawl-stars-gameloop-2-0-11646-123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TenioDL.exe -
Modifies registry class 3 IoCs
Processes:
TenioDL.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\metnsd\clsid\SequenceID = 5290a69b3bc1124d854fc028d7db4cdf TenioDL.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\metnsd\clsid TenioDL.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\metnsd TenioDL.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
brawl-stars-gameloop-2-0-11646-123.exepid process 2440 brawl-stars-gameloop-2-0-11646-123.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
TenioDL.exedescription pid process Token: SeManageVolumePrivilege 2696 TenioDL.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
brawl-stars-gameloop-2-0-11646-123.exeTenioDL.exedescription pid process target process PID 2440 wrote to memory of 2696 2440 brawl-stars-gameloop-2-0-11646-123.exe TenioDL.exe PID 2440 wrote to memory of 2696 2440 brawl-stars-gameloop-2-0-11646-123.exe TenioDL.exe PID 2440 wrote to memory of 2696 2440 brawl-stars-gameloop-2-0-11646-123.exe TenioDL.exe PID 2440 wrote to memory of 2696 2440 brawl-stars-gameloop-2-0-11646-123.exe TenioDL.exe PID 2696 wrote to memory of 2552 2696 TenioDL.exe icacls.exe PID 2696 wrote to memory of 2552 2696 TenioDL.exe icacls.exe PID 2696 wrote to memory of 2552 2696 TenioDL.exe icacls.exe PID 2696 wrote to memory of 2552 2696 TenioDL.exe icacls.exe PID 2440 wrote to memory of 568 2440 brawl-stars-gameloop-2-0-11646-123.exe Netsh.exe PID 2440 wrote to memory of 568 2440 brawl-stars-gameloop-2-0-11646-123.exe Netsh.exe PID 2440 wrote to memory of 568 2440 brawl-stars-gameloop-2-0-11646-123.exe Netsh.exe PID 2440 wrote to memory of 568 2440 brawl-stars-gameloop-2-0-11646-123.exe Netsh.exe PID 2440 wrote to memory of 2212 2440 brawl-stars-gameloop-2-0-11646-123.exe Netsh.exe PID 2440 wrote to memory of 2212 2440 brawl-stars-gameloop-2-0-11646-123.exe Netsh.exe PID 2440 wrote to memory of 2212 2440 brawl-stars-gameloop-2-0-11646-123.exe Netsh.exe PID 2440 wrote to memory of 2212 2440 brawl-stars-gameloop-2-0-11646-123.exe Netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\brawl-stars-gameloop-2-0-11646-123.exe"C:\Users\Admin\AppData\Local\Temp\brawl-stars-gameloop-2-0-11646-123.exe"1⤵
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Roaming\Tencent\TxGameAssistant\GameDownload\TenioDL.exeC:\Users\Admin\AppData\Roaming\Tencent\TxGameAssistant\GameDownload\TenioDL.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" C:\Users\Admin\AppData\Roaming\Tencent\Config\ /t /setintegritylevel low3⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:2552 -
C:\Windows\SysWOW64\Netsh.exe"C:\Windows\system32\Netsh.exe" advfirewall firewall delete rule name="腾讯手游助手下载器组件"2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:568 -
C:\Windows\SysWOW64\Netsh.exe"C:\Windows\system32\Netsh.exe" advfirewall firewall delete rule name="腾讯手游助手下载器"2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2212
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Disable or Modify System Firewall
1Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
543KB
MD511d65a68132e918bd80e7e0a09029730
SHA1c1978c02176e1e370c66d1597e964eab908847dc
SHA25636c18dedac0429375c583fcf9420cdc9ace8a38bbac9f33378b5b4d6739da511
SHA51234278a85cfdad1b2086b9368368b6eada08829c3237d02d0afbfced4f32df38e95a5ca0a600fc8d8c98c33d6cc8d4ac82c3279ccdba36cb0ed4738c1c0648315
-
Filesize
2.9MB
MD5b1b101d86c417286e60f471fc8b79bb1
SHA1b602bee2a25ed63a1f9cda72c83bdadd44dcd07c
SHA25691cfa1769be449dfdfbf6bcc8049ce5c9218df6deaa66a0879528526b204a51a
SHA5120a1d03364e1a52c08d6992a52b31b29f54c3781c009562427c560338db5428b74b55fab41f9c48c7018ddce41ab6a7f8593fbf12a75ae472c11590a36b42682b
-
Filesize
523KB
MD534431eb1ae2d3ac86e3415d8c3e977a3
SHA1b2eae82dffecdbe02ef877d5a4d28de83b84bd59
SHA2568379e09c7a3a51bdb652418781ceed8067e324b656c7d5a307b9a77c899f0806
SHA51232b1d12630ced494b5168037a1d0899b3576970f603b5e69bf48fd915a4dad51d877e97bc91660929719e3a1395344ec39d5cc5b761111096c4523563d3bdd5e
-
Filesize
167KB
MD58fb4e336f4c145eb6e379701c3ac59d1
SHA1ad53b732cabd515035784f187aeaab4d8a6b67c7
SHA256d7a59b5ba3f0fb3906ebaa7a67c76088995a1f37652a2ae9893977c19754d9bf
SHA512c83b726e867f47c9fdabaf3151ae74c07e2b74be47f8ec41685fee744eba41c81614faaf473fcd28cabc044545eddcad5cbbaf67e90109d916e109c1b5d6a770
-
Filesize
74KB
MD52814acbd607ba47bdbcdf6ac3076ee95
SHA150ab892071bed2bb2365ca1d4bf5594e71c6b13b
SHA2565904a7e4d97eeac939662c3638a0e145f64ff3dd0198f895c4bf0337595c6a67
SHA51234c73014ffc8d38d6dd29f4f84c8f4f9ea971bc131f665f65b277f453504d5efc2d483a792cdea610c5e0544bf3997b132dcdbe37224912c5234c15cdb89d498