Analysis

  • max time kernel
    152s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-01-2023 19:00

General

  • Target

    Chernobylite v45385 Plus 21 Trainer.exe

  • Size

    1.3MB

  • MD5

    5b1c7f66423d2995ebbf04ca5a2eb498

  • SHA1

    07c3ff2e9e6a8b54583da04516c560063dcc9cd5

  • SHA256

    f76958e55ad98a85731389c27c06dbfd908881a3a7d4e4bfe9f87771da1a2591

  • SHA512

    1503ea972e6546c8a680ff8fd6a0ea0236fc6f3979b29d4c37372c51ed649d6202addbdbb4ed9b5a3f9c1e8b339ca4f2ace5d5c5e24ca611cf0e0db980406c95

  • SSDEEP

    24576:hX9x4XUrFRL1gnf68uuRJtdajXHY/dswmZuxGDS9miAxbJ7:546R5gS8ntg7WsXDiAxV7

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Chernobylite v45385 Plus 21 Trainer.exe
    "C:\Users\Admin\AppData\Local\Temp\Chernobylite v45385 Plus 21 Trainer.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:764

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/764-132-0x00007FFE1C5A0000-0x00007FFE1D061000-memory.dmp

    Filesize

    10.8MB

  • memory/764-133-0x000002BEFD6CA000-0x000002BEFD6CF000-memory.dmp

    Filesize

    20KB

  • memory/764-134-0x00007FFE1C5A0000-0x00007FFE1D061000-memory.dmp

    Filesize

    10.8MB

  • memory/764-135-0x000002BEFD6CA000-0x000002BEFD6CF000-memory.dmp

    Filesize

    20KB