Resubmissions

24/03/2023, 17:54

230324-whbnzagd42 6

24/03/2023, 17:51

230324-wfeb3sgd26 6

Analysis

  • max time kernel
    112s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/03/2023, 17:51

General

  • Target

    FMod_Launcher (1).exe

  • Size

    1.6MB

  • MD5

    dbcd36d12a22f43052c7b1c4f795e533

  • SHA1

    1ac35d781d8c8e495ec46249451558f758ce3d41

  • SHA256

    11b3cfe00741aecc278e6ef0da367f4ac1ac1c7463c6d616f3f6b9e5339929a2

  • SHA512

    67f52702c283246dfdceb3281aad9fc9d539b7883544cf825e9dcee738facdeba544b31fbe3cbd04cbc57a2a7a2662cd1b713979414b1aa4489b01dce2388314

  • SSDEEP

    49152:SrgBWBKH8jkDVFCNXODzWS9HfX0Hj7FMCGJr:b+KH4kpc+DX/0HnFdG

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FMod_Launcher (1).exe
    "C:\Users\Admin\AppData\Local\Temp\FMod_Launcher (1).exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4784

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4784-133-0x000001EEAED50000-0x000001EEAEEE6000-memory.dmp

    Filesize

    1.6MB

  • memory/4784-134-0x000001EEB0B20000-0x000001EEB0B30000-memory.dmp

    Filesize

    64KB

  • memory/4784-135-0x000001EEB0B20000-0x000001EEB0B30000-memory.dmp

    Filesize

    64KB

  • memory/4784-136-0x000001EEB0B20000-0x000001EEB0B30000-memory.dmp

    Filesize

    64KB

  • memory/4784-137-0x000001EEB0B20000-0x000001EEB0B30000-memory.dmp

    Filesize

    64KB

  • memory/4784-138-0x000001EEB0B20000-0x000001EEB0B30000-memory.dmp

    Filesize

    64KB

  • memory/4784-139-0x000001EEB0B20000-0x000001EEB0B30000-memory.dmp

    Filesize

    64KB

  • memory/4784-140-0x000001EEB0B20000-0x000001EEB0B30000-memory.dmp

    Filesize

    64KB

  • memory/4784-141-0x000001EEB0B20000-0x000001EEB0B30000-memory.dmp

    Filesize

    64KB

  • memory/4784-142-0x000001EEB0B20000-0x000001EEB0B30000-memory.dmp

    Filesize

    64KB

  • memory/4784-143-0x000001EEB0B20000-0x000001EEB0B30000-memory.dmp

    Filesize

    64KB

  • memory/4784-144-0x000001EEB0B20000-0x000001EEB0B30000-memory.dmp

    Filesize

    64KB