Analysis
-
max time kernel
35s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
24-10-2022 08:48
Behavioral task
behavioral1
Sample
MetaWorld/Meta World Launcher beta.exe
Resource
win7-20220901-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
MetaWorld/Meta World Launcher beta.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
10 signatures
150 seconds
General
-
Target
MetaWorld/Meta World Launcher beta.exe
-
Size
714.9MB
-
MD5
96d65eabe7288c7590f44795a9822823
-
SHA1
080df69b94e4e7afcafd935c71098ba62aafad4d
-
SHA256
6cddbdcb02b77f840aa179df779d702c805fe48cf5b6425d062ade87450e705e
-
SHA512
b3b84c329a85f1ac9c70927bab5df924c1306ee6907ae483396c85705bf86211941b8d7423acc15a4f90cfeee69d5ae7a04504d4391e0225ba70f44318e84a40
-
SSDEEP
98304:MJmvB+wUnhopFNE8yCE+8t7PxBTylOqtKQCHb/i+E:gYin6pU8yCE+8FxBTH9QC7d
Score
6/10
Malware Config
Signatures
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
AppLaunch.exepid process 1204 AppLaunch.exe 1204 AppLaunch.exe 1204 AppLaunch.exe 1204 AppLaunch.exe 1204 AppLaunch.exe 1204 AppLaunch.exe 1204 AppLaunch.exe 1204 AppLaunch.exe 1204 AppLaunch.exe 1204 AppLaunch.exe 1204 AppLaunch.exe 1204 AppLaunch.exe 1204 AppLaunch.exe 1204 AppLaunch.exe 1204 AppLaunch.exe 1204 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 1204 AppLaunch.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
Meta World Launcher beta.exedescription pid process target process PID 1652 wrote to memory of 1204 1652 Meta World Launcher beta.exe AppLaunch.exe PID 1652 wrote to memory of 1204 1652 Meta World Launcher beta.exe AppLaunch.exe PID 1652 wrote to memory of 1204 1652 Meta World Launcher beta.exe AppLaunch.exe PID 1652 wrote to memory of 1204 1652 Meta World Launcher beta.exe AppLaunch.exe PID 1652 wrote to memory of 1204 1652 Meta World Launcher beta.exe AppLaunch.exe PID 1652 wrote to memory of 1204 1652 Meta World Launcher beta.exe AppLaunch.exe PID 1652 wrote to memory of 1204 1652 Meta World Launcher beta.exe AppLaunch.exe PID 1652 wrote to memory of 1204 1652 Meta World Launcher beta.exe AppLaunch.exe PID 1652 wrote to memory of 1204 1652 Meta World Launcher beta.exe AppLaunch.exe PID 1652 wrote to memory of 1204 1652 Meta World Launcher beta.exe AppLaunch.exe PID 1652 wrote to memory of 1204 1652 Meta World Launcher beta.exe AppLaunch.exe PID 1652 wrote to memory of 1204 1652 Meta World Launcher beta.exe AppLaunch.exe PID 1652 wrote to memory of 1204 1652 Meta World Launcher beta.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\MetaWorld\Meta World Launcher beta.exe"C:\Users\Admin\AppData\Local\Temp\MetaWorld\Meta World Launcher beta.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1204-58-0x0000000000400000-0x0000000000484000-memory.dmpFilesize
528KB
-
memory/1204-59-0x0000000000400000-0x0000000000484000-memory.dmpFilesize
528KB
-
memory/1204-61-0x0000000000400000-0x0000000000484000-memory.dmpFilesize
528KB
-
memory/1204-63-0x0000000000400000-0x0000000000484000-memory.dmpFilesize
528KB
-
memory/1204-64-0x0000000000000000-mapping.dmp
-
memory/1204-66-0x0000000000400000-0x0000000000484000-memory.dmpFilesize
528KB
-
memory/1204-65-0x0000000000400000-0x0000000000484000-memory.dmpFilesize
528KB
-
memory/1204-68-0x0000000000400000-0x0000000000484000-memory.dmpFilesize
528KB
-
memory/1204-70-0x0000000000530000-0x0000000000536000-memory.dmpFilesize
24KB
-
memory/1652-54-0x00000000757A1000-0x00000000757A3000-memory.dmpFilesize
8KB
-
memory/1652-55-0x0000000000100000-0x0000000000775000-memory.dmpFilesize
6.5MB