Analysis
-
max time kernel
152s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 03:05
Static task
static1
Behavioral task
behavioral1
Sample
5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe
Resource
win10v2004-20220414-en
General
-
Target
5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe
-
Size
4.5MB
-
MD5
5e5cb405fe00fce0170ff03b6c27de65
-
SHA1
b71ba01901946acf3dd9c607b0ab744b9bb2d8b3
-
SHA256
5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f
-
SHA512
272f1457cf8f843ca00281347fd25a29840e7711773dbd60e1b923df3f2040f7720cd17dfe5c5fc8262fe8e0e03fc0334ac9b99abe6dac8d193d214fb221dea0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Euro Truck Simulator 2 Trainer.exepid process 4884 Euro Truck Simulator 2 Trainer.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exeEuro Truck Simulator 2 Trainer.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Euro Truck Simulator 2 Trainer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Euro Truck Simulator 2 Trainer.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exeEuro Truck Simulator 2 Trainer.exedescription ioc process File opened for modification \??\PhysicalDrive0 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe File opened for modification \??\PhysicalDrive0 Euro Truck Simulator 2 Trainer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exeEuro Truck Simulator 2 Trainer.exepid process 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe 4884 Euro Truck Simulator 2 Trainer.exe 4884 Euro Truck Simulator 2 Trainer.exe 4884 Euro Truck Simulator 2 Trainer.exe 4884 Euro Truck Simulator 2 Trainer.exe 4884 Euro Truck Simulator 2 Trainer.exe 4884 Euro Truck Simulator 2 Trainer.exe 4884 Euro Truck Simulator 2 Trainer.exe 4884 Euro Truck Simulator 2 Trainer.exe 4884 Euro Truck Simulator 2 Trainer.exe 4884 Euro Truck Simulator 2 Trainer.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
Euro Truck Simulator 2 Trainer.exepid process 4884 Euro Truck Simulator 2 Trainer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exeEuro Truck Simulator 2 Trainer.exedescription pid process Token: SeDebugPrivilege 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe Token: SeDebugPrivilege 4884 Euro Truck Simulator 2 Trainer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Euro Truck Simulator 2 Trainer.exepid process 4884 Euro Truck Simulator 2 Trainer.exe 4884 Euro Truck Simulator 2 Trainer.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exedescription pid process target process PID 4740 wrote to memory of 4884 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe Euro Truck Simulator 2 Trainer.exe PID 4740 wrote to memory of 4884 4740 5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe Euro Truck Simulator 2 Trainer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe"C:\Users\Admin\AppData\Local\Temp\5edbe1c8a1323e88fdf95f31c9f72bb25d1ea67e71ac532540c79cf9f25d838f.exe"1⤵
- Checks BIOS information in registry
- Checks computer location settings
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\FutureXGame\Euro Truck Simulator 2 Trainer.exe"C:\Users\Admin\FutureXGame\Euro Truck Simulator 2 Trainer.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\FutureXGame\Euro Truck Simulator 2 Trainer.exeFilesize
3.0MB
MD5a622b7290f48eacb5310f08af996c3c6
SHA17d0dfdda1b879c31a480cdc03c0158382938c372
SHA2568cb54573fcd40beddfbb0da292626d9a52606ca6cb534a9af0ee03517ec0dd27
SHA512201b08dcb957b6b495a60707067411a26aff7144d85981669e17e52a764e2bc00b25d0f0d230c989c96ec3b7ba7936e74d5def655872dd86f233d3e065459800
-
C:\Users\Admin\FutureXGame\Euro Truck Simulator 2 Trainer.exeFilesize
3.0MB
MD5a622b7290f48eacb5310f08af996c3c6
SHA17d0dfdda1b879c31a480cdc03c0158382938c372
SHA2568cb54573fcd40beddfbb0da292626d9a52606ca6cb534a9af0ee03517ec0dd27
SHA512201b08dcb957b6b495a60707067411a26aff7144d85981669e17e52a764e2bc00b25d0f0d230c989c96ec3b7ba7936e74d5def655872dd86f233d3e065459800
-
C:\Users\Admin\FutureXGame\settings.txtFilesize
181B
MD566f61eea90c02d341866435081d81fa9
SHA195f6ae37051fde1f98b7ae39fb6b298d63cb4d71
SHA2564d66a95c7122f08d61713f4d68f5e75102a1d5b8215dc6cc30b66897208ded31
SHA5125e44db87ef8170936c97bff9eed1dabfc8598ba1bace02e5299146956a8812af93c78bd8a768e15452bd6917b2ff2be37dbdf4389425994abae8e66ef5401a20
-
memory/4740-133-0x00007FFBC3720000-0x00007FFBC41E1000-memory.dmpFilesize
10.8MB
-
memory/4740-130-0x00007FFBE0EF0000-0x00007FFBE10E5000-memory.dmpFilesize
2.0MB
-
memory/4740-132-0x0000000000380000-0x0000000000A02000-memory.dmpFilesize
6.5MB
-
memory/4740-131-0x0000000000380000-0x0000000000A02000-memory.dmpFilesize
6.5MB
-
memory/4884-134-0x0000000000000000-mapping.dmp
-
memory/4884-137-0x0000000000090000-0x00000000005C8000-memory.dmpFilesize
5.2MB
-
memory/4884-138-0x0000000000090000-0x00000000005C8000-memory.dmpFilesize
5.2MB
-
memory/4884-139-0x00007FFBE0EF0000-0x00007FFBE10E5000-memory.dmpFilesize
2.0MB
-
memory/4884-140-0x00007FFBC3720000-0x00007FFBC41E1000-memory.dmpFilesize
10.8MB
-
memory/4884-142-0x000000002F410000-0x000000002FBB6000-memory.dmpFilesize
7.6MB