Analysis
-
max time kernel
65s -
max time network
91s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
31/01/2023, 22:20
Static task
static1
Behavioral task
behavioral1
Sample
GenshinImpact_install_20230104163543.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
GenshinImpact_install_20230104163543.exe
Resource
win10v2004-20220812-en
General
-
Target
GenshinImpact_install_20230104163543.exe
-
Size
118.4MB
-
MD5
7c54bc2ef1e7c306e9c6af92e3e6016c
-
SHA1
154155b98601fa93de119a66fbf8344e78adf4f1
-
SHA256
4f9217c9c2d8e5eacff91ad74f9e59efca3897a1885941053cf586a76f076099
-
SHA512
53b4a477d5caead029cf41d9dda73522b18dd36c809438de4b9a2fd93ef06269e58123d035ee1834b00150b0684e82e100ceb0c46cc2f84ad7fb979619c3f0ad
-
SSDEEP
3145728:zSd8/4DaN6JzlfJIacMERP42xgmPJM09F2cf4gCSuLQZUOwIig:k5aOYaHT2xgEJMI2tQlig
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ GenshinImpact_install_20230104163543.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString GenshinImpact_install_20230104163543.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 GenshinImpact_install_20230104163543.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 GenshinImpact_install_20230104163543.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1256 GenshinImpact_install_20230104163543.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1256 GenshinImpact_install_20230104163543.exe