Analysis

  • max time kernel
    90s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-02-2023 18:22

General

  • Target

    GenshinImpact_install_20230104163543.exe

  • Size

    118.4MB

  • MD5

    7c54bc2ef1e7c306e9c6af92e3e6016c

  • SHA1

    154155b98601fa93de119a66fbf8344e78adf4f1

  • SHA256

    4f9217c9c2d8e5eacff91ad74f9e59efca3897a1885941053cf586a76f076099

  • SHA512

    53b4a477d5caead029cf41d9dda73522b18dd36c809438de4b9a2fd93ef06269e58123d035ee1834b00150b0684e82e100ceb0c46cc2f84ad7fb979619c3f0ad

  • SSDEEP

    3145728:zSd8/4DaN6JzlfJIacMERP42xgmPJM09F2cf4gCSuLQZUOwIig:k5aOYaHT2xgEJMI2tQlig

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\GenshinImpact_install_20230104163543.exe
    "C:\Users\Admin\AppData\Local\Temp\GenshinImpact_install_20230104163543.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:5012

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads