Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 17:41
Behavioral task
behavioral1
Sample
2022年全部热门单机游戏及汉化下载.url
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2022年全部热门单机游戏及汉化下载.url
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Lost Judgment v1.11-v20221018 Plus 32 Trainer.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Lost Judgment v1.11-v20221018 Plus 32 Trainer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
www.3dmgame.com.url
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
www.3dmgame.com.url
Resource
win10v2004-20241007-en
General
-
Target
www.3dmgame.com.url
-
Size
122B
-
MD5
49cbfed4fa9b3fafdc9d499b6163fa62
-
SHA1
28decd9138bd3f7b3ef38bf9e40cd0d6305d1cdb
-
SHA256
03df27e82600098c34c413cc2e45b43638d3ac33666960cfbd913f1c3f9a0b11
-
SHA512
64e91ed564ef64d7687599012c4728b811fec2661dcb7941374cdd3a8450563073c67c452d97d43545f49182fbda2c26702dd35088723ace21717282d1233627
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2224 msedge.exe 2224 msedge.exe 116 msedge.exe 116 msedge.exe 3404 identity_helper.exe 3404 identity_helper.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5048 wrote to memory of 116 5048 rundll32.exe 83 PID 5048 wrote to memory of 116 5048 rundll32.exe 83 PID 116 wrote to memory of 5060 116 msedge.exe 85 PID 116 wrote to memory of 5060 116 msedge.exe 85 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2464 116 msedge.exe 86 PID 116 wrote to memory of 2224 116 msedge.exe 87 PID 116 wrote to memory of 2224 116 msedge.exe 87 PID 116 wrote to memory of 2600 116 msedge.exe 88 PID 116 wrote to memory of 2600 116 msedge.exe 88 PID 116 wrote to memory of 2600 116 msedge.exe 88 PID 116 wrote to memory of 2600 116 msedge.exe 88 PID 116 wrote to memory of 2600 116 msedge.exe 88 PID 116 wrote to memory of 2600 116 msedge.exe 88 PID 116 wrote to memory of 2600 116 msedge.exe 88 PID 116 wrote to memory of 2600 116 msedge.exe 88 PID 116 wrote to memory of 2600 116 msedge.exe 88 PID 116 wrote to memory of 2600 116 msedge.exe 88 PID 116 wrote to memory of 2600 116 msedge.exe 88 PID 116 wrote to memory of 2600 116 msedge.exe 88 PID 116 wrote to memory of 2600 116 msedge.exe 88 PID 116 wrote to memory of 2600 116 msedge.exe 88 PID 116 wrote to memory of 2600 116 msedge.exe 88 PID 116 wrote to memory of 2600 116 msedge.exe 88 PID 116 wrote to memory of 2600 116 msedge.exe 88 PID 116 wrote to memory of 2600 116 msedge.exe 88
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\www.3dmgame.com.url1⤵
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.3dmgame.com/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbc44146f8,0x7ffbc4414708,0x7ffbc44147183⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,12331410675375690659,6248688913936130237,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1988 /prefetch:23⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1976,12331410675375690659,6248688913936130237,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1976,12331410675375690659,6248688913936130237,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:83⤵PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,12331410675375690659,6248688913936130237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:13⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,12331410675375690659,6248688913936130237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:13⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,12331410675375690659,6248688913936130237,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 /prefetch:83⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,12331410675375690659,6248688913936130237,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,12331410675375690659,6248688913936130237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:13⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,12331410675375690659,6248688913936130237,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:13⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,12331410675375690659,6248688913936130237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:13⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,12331410675375690659,6248688913936130237,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:13⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,12331410675375690659,6248688913936130237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:13⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,12331410675375690659,6248688913936130237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3952 /prefetch:13⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,12331410675375690659,6248688913936130237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5972 /prefetch:13⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,12331410675375690659,6248688913936130237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:13⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,12331410675375690659,6248688913936130237,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3608 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4356
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2816
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
5KB
MD560834c2456502365065f00051ccb5dab
SHA195a2015ed446e3b9255e80453b68c7dafdde48c2
SHA256cc7f8c54d5f3ce7a36bc6721542a876f73b8a0c2056c0a4169708bb097670530
SHA5128738ede37d961df991c181bbeff0e92886cb1703017fdb9ad7f38a6fb65930d71b7df24728f0d90d01938a7e9925075b71c30c81783737a73b3ac0f419ad1a4d
-
Filesize
6KB
MD5ea650ace82a924da31469af073acf1a5
SHA19effe5e0f55e5a47ff0c16511b417a5af9fd9aaa
SHA25652838161456fe39bb478eb965f0b862ddeb970ad5859f8faa143e8a36744a91f
SHA512102d2c77f0ce6d1fb553d887af9bf7abae19eb0cc5af0f790400409a1a05c941e9266b3802a86e0884dfd62a40579c90248960cab88d132ad93eb5befe0ef70c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5cc44eb97cfc8c50bde0538d72309d6bb
SHA168b66d6673e28609c44546806fa61f0a13efa1c3
SHA25600bc4d83aaea40afb97be7cce694a776d17126a6b014e3f6fe3b3c1e531231c8
SHA512162a79fbec18db17b59a1dc77fc3645f5413ea2ab572962bc723dab6aafc920ad3ba9f9942cdd4a0abe8ef42ca59016cd17dcd0d2b121146084b9f332ed958e0