Analysis

  • max time kernel
    56s
  • max time network
    59s
  • platform
    windows10_x64
  • resource
    win10-20220414-en
  • submitted
    13-06-2022 20:27

General

  • Target

    Death Stranding Directors Cut v1.0 Plus 26 Trainer.exe

  • Size

    1.1MB

  • MD5

    bf36e1d433dfa61e97f7d92f44f1af19

  • SHA1

    d1b1f74bec890ae02c3d5284f0e190195cf87f20

  • SHA256

    4e2d60184a4f38ee5d38a702b4409772b58a7bb2eba4b87830ec6df141d7f286

  • SHA512

    88c1f2e488efdd7b04ebe0c7bab818129680e6cc1e7f4ab373f99d6691cc77a3729045f18deb01d019a21bac3e1606a878366937775a936a52dc78448b400a5d

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Death Stranding Directors Cut v1.0 Plus 26 Trainer.exe
    "C:\Users\Admin\AppData\Local\Temp\Death Stranding Directors Cut v1.0 Plus 26 Trainer.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1492
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1944
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:4056
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:200
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:716

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1492-119-0x000001EC24290000-0x000001EC242C2000-memory.dmp

    Filesize

    200KB

  • memory/1492-120-0x000001EC3C7FA000-0x000001EC3C7FF000-memory.dmp

    Filesize

    20KB

  • memory/1492-123-0x000001EC3C7FA000-0x000001EC3C7FF000-memory.dmp

    Filesize

    20KB

  • memory/1492-125-0x000001EC3C7FA000-0x000001EC3C7FF000-memory.dmp

    Filesize

    20KB

  • memory/1944-121-0x000002C17FE20000-0x000002C17FE30000-memory.dmp

    Filesize

    64KB

  • memory/1944-122-0x000002C100000000-0x000002C100010000-memory.dmp

    Filesize

    64KB