Analysis
-
max time kernel
122s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 17:41
Behavioral task
behavioral1
Sample
2022年全部热门单机游戏及汉化下载.url
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2022年全部热门单机游戏及汉化下载.url
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Lost Judgment v1.11-v20221018 Plus 32 Trainer.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Lost Judgment v1.11-v20221018 Plus 32 Trainer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
www.3dmgame.com.url
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
www.3dmgame.com.url
Resource
win10v2004-20241007-en
General
-
Target
www.3dmgame.com.url
-
Size
122B
-
MD5
49cbfed4fa9b3fafdc9d499b6163fa62
-
SHA1
28decd9138bd3f7b3ef38bf9e40cd0d6305d1cdb
-
SHA256
03df27e82600098c34c413cc2e45b43638d3ac33666960cfbd913f1c3f9a0b11
-
SHA512
64e91ed564ef64d7687599012c4728b811fec2661dcb7941374cdd3a8450563073c67c452d97d43545f49182fbda2c26702dd35088723ace21717282d1233627
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "441742369" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{542A4221-C6D5-11EF-B954-F2DF7204BD4F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00bb0142e25adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d22070859380744b96f6fae1d5a86e65000000000200000000001066000000010000200000005d1cd35f1c7e2bb8089b0bec073a1ce0a4e517b4fb3ca7e19598134e265044e2000000000e8000000002000020000000bda0b4780bddba002bcc4b0f9160b132b0e22f646b3c920179276d0a36305f5e2000000057a99b753f171774c4b5f70b7e0d4a64a6b6d20ba1666f34ba5e1bf5a00441aa400000008f03cc8f9747e30afd6028a305f177c9653ffcc2aa0a978fba2bdae1c89f7369b07ee288f2cf84fd0fdb92d9173bd53eeb6397791d1b595e52a0b63d2100cba1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2848 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2848 iexplore.exe 2848 iexplore.exe 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2964 2848 iexplore.exe 32 PID 2848 wrote to memory of 2964 2848 iexplore.exe 32 PID 2848 wrote to memory of 2964 2848 iexplore.exe 32 PID 2848 wrote to memory of 2964 2848 iexplore.exe 32
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\www.3dmgame.com.url1⤵
- Checks whether UAC is enabled
PID:2704
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2848 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5546069f46f13ec404522727cf370f1e6
SHA11925a839903ffca3bd07d3e463aef7c78eb37595
SHA256b2e9af6587df1823b1adc1f224f78100a6bf4dd1bf0c24206c1631dbd9cab4bb
SHA51216b715a5b2b562a1cfb9492048f0fd9a42c6db4c736787dc5f3fffac33c9eb642363c6e23421837d8d4b627487f97cdc12b3ff26071ffc5f1624486fd11416ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555cc7438c272a2107c4f89d25b13843c
SHA16f7ba4833cd8a661d361be9fd670daabfaed2dde
SHA256e97d2db72fdaf5f7c851ab8ed601b76dec296a9b3869fd237148cbcc154564e8
SHA5123ec80e39d0c88f65994fb090dda9aac0ee6907d97639a286fe574d3f9b771f3fc2f27542cfda10ada97681a1c20579bb6c6274a7f35f18e0910fd8d73cf7d8c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597f255eff99ec40d6c36a3394e9c91e3
SHA15f335313e659afe28e8ef62fda421712f8106c7b
SHA25604230a963622f44a9439e7099ba226dd9edf0902cf94854263bd82d04a9245bc
SHA512489980fc356b51d50b500f9c411741c6da9324828d8f30291a92cca80db9b0d355ac6987f965ffb79bfbe4e83eee6792208cdc5cdf6ddfa143d46ae9b68d43b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffc286ad186d3f3c06954cd7df48e2c8
SHA10ee7d988c5ab1e58cd8185934c054b65dce05e99
SHA256354faa39f3bfefae17e51b2e537d7094bb65cb23d4588bd4e34838de9a42cec4
SHA5127ca859128fa1085a61a87091eaf1dc93dae1cfd4719d9bdb829dfd107ce70f12c24f5190c859b35f6c60e81e24336c34303364f12da2e324259a51178159c075
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdbf2de7ac021ebedd412d46776070c1
SHA1380eb765892d31336e46a647e632d1ccf4c27c60
SHA256d2cf40cc922e86d198ca3ce57c6e3b900fa41e46dcd839c751c51fb997f997ac
SHA512ad7e4aabef0314c4c97c10c140c4edadb06fb877f42342d288201136fb693e55e6bd8e527b17ae5c839ad5766673752ae4dd62e9fcb1fc3adfd05e3a774ad55f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9388b3764271d7573f1d65cef632bf6
SHA1e0753b935d19ea9c2726f7a02c975376b38307ee
SHA256ea8b7016715a07e32380ceaa78cdace3a92096d7d927a054bb91dab6dde411ef
SHA512f85bf1806077721ab2933786bb3b0b7bc6d51998c7cc7ae3468f10e28405d49d1f930133bd7ed474233b51740e4ff11620ff9ccc795b26d05d98fe20af9daa6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6c49dd2c96d54b1ba9d045f8797aa03
SHA17a802fad6860ea82a2a57894481dae5e2b151772
SHA2561812a3cbaadd91fd41148688247b43406b62f2235c6c6749807b0857720979ba
SHA512b6f939093f61b444e2c36e3553ad3dfba96dea5d7f6387a1e13530cb5c7600e5fa2ffd850430cbbcd22efcaffe4262eccddf8df2e920f4b0f1bb9fd0002f55ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58772fc0307ab1fa679645b745f89c131
SHA1677b52286a82f56b333cad8fdaf5cbc76a193ddd
SHA25684fe8eab22d1290870aca483c7b32bb2d0d5002acb8688837c6bb49ab0145743
SHA512c3ef3cc5c42cfa51558ccac7e12458710c046aa56ab68a9bb0d0b66ca41dc23b17bc4827c6050fc04b337db4311932ec8e1b6b116b9595e8a429d2b46a03e399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0b0859037675d3c02a6a1a203b1f5ed
SHA114155b7439cbc4f9432909f89b32e7d0ba21a44a
SHA2568cf1489ef711f0eef9d4ecf6cc73cdda190533b6ff8156efc4c7ff5f2d399540
SHA51200986d94d565821637cbe0bd864bb03389caf3de02e066af2d270d8a1a831c6b419d6f8ffa84b3d8de41c2922bd5e9cdd034be0f5c522d203d5f0996700e9693
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdf963bfae7e982b3b595d1e368320c2
SHA1ab56cef6660c3270409c9df9dab8b82eebf73720
SHA25650decea3495cd59a36c0133528b3915500908c9a2e2cf0d93535ae5feaf96da5
SHA51293cdff69c956813958019f56e168f62c6e56df961b043c95f4a8da38a27d376cb2a3202b301591575930b22c6a372c5a10f87661ec4524ab467020fc35286dcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff2948cb2cefdf7ced427c9dcaa53233
SHA12d657345febcdd8a6c657f78f9eac6cb285de9ff
SHA2566a35e8bf3620964af522700bb8fd9ec759c453205a7430455f4b97880da68a2c
SHA512baaec0406dcd07a4a54fcd447b576882707d675d26648e099e5d3510eea17924f836d56a9ec4e3c107500eb2fbba8a479aaffbc9c19c7d77f7215bf055db290d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bba3d391ec16dcd96163c806dd58e6c8
SHA1c05c43f6d1295d3929fe19c2bfe7f6212cfdbb3a
SHA2562602f84d08ced910fc5e78a188fba4f221cddc598fd09aff98a17eab3fb48454
SHA512d90cf938d350ae29575300ba3d6b9928b4e19942c9d0984440c7aabcbd3c78d22a0c039c6d8df6a79e38929ea44a8b4fa02319611a1e43c12cb00377c442cfd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af1111a85a3a981a6890bc70ecc058ed
SHA1d20ccba8a46677785264644d0536cadae17b0ffb
SHA25616320104ca78a3a506ad4bb96596bbed4e52032efea8dfec4711625354b210fd
SHA5124a72027d87037de8959de716f16eea475ea2b790651a5f628d8a01bd32b01864be02dfaa1a265774d3aa4badbb0e11fedeecbcc3831d6ed59f3bfa4be184d1df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b595c6ecaa9f3335f3deafc8022e57ad
SHA17967f0a971d93c0f2bcf7213a787726b70584a36
SHA256842fab563ce22e222fab52757f66f92db11d28c117e648c25414ac24efbe79f1
SHA512f18917140c05610c3f50eb02b83359eb785d7b53fb7f2a17b6ab9c58f59d383924405002af2edb130901f454ef58b0952d810f93b24fc37a007727d3331b704c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bf28c4220964657a99da34dfadc33bc
SHA16acd54bb012cda511615b9cebc1d6e9a5a81e208
SHA2568e1c36f3068a5abc0a5254f1c034ded590197ba8f33c8c42d62cfe879b257888
SHA512590ec44d21af402da267f9a2ae588547261e9a2951e28061d542cd97e5caffb9f19c0732759008faebcdf4e72ff65fe931cb6c46b8ea9eabac78333424171852
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5643f3426d57fa0aeb437e613060b491b
SHA16c76166c434012bf8a6edbd0aa941672f1efec93
SHA256c53c91f78dfe34fdf2bf2f9b1f5e87da1c81ac00e881ff3b7ac97c967751d152
SHA512043e54d4057d87b941cafe8cc53b02832d8fb5d4f0ceaeabbee14d6bbae43fdb68af21bd63565cee82b1237eb540577c3b51eb74c6d37fbc3e716205b7e65638
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e734211ba74a42b57f25e16275278944
SHA1824694c72c913e0293d5f38a4b8b8bd54b1b028b
SHA25657084e52de4a710f47aee85cfb7b5f03c46f8682ef3c4277c7408b1b213e7708
SHA5121b66e01ff8a96a16271b7e36d0a9162441a2d185f9a86a59607f2ecced2ce5577e1c9be6b9f4760813020a0abe5f2658aca1b4f9c9f8a1cf4a23543d7714689c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51db8aea37e35b279882b23910ff78704
SHA1189ec0bbea0a47feec936d0c479fb95c15ad7318
SHA2564f74966b8e7adb99aaa0f56459aeba20ec373a92e10c151226b4afa0f5f36180
SHA5122c70cacf41aba3b2b2a2b3c1583775a63aed72a0e4a3c98f4c3ddd9ceac7afd20acaec9d905d2c34254ac2d2caeef7a83688bb6380476b1a4ecbda8c5a3af95b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a600887632a551cc4ff163cc6a25870
SHA111f8d92e332212823552d59c429feb22fcf9cc6f
SHA2565db2c7cf83cae2c907eeae9610a1945012b081a94a3398d760aa8cb5103d7982
SHA512ddd5fef33bd0a9e8fcfe465ab6ac0e9916fd62a29e12b37e4ad0c3f7c6cba7ee8db5426953ed9043b0a77d224d8970cbff2b630db96d3e787b6bd3f16886809d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b