Analysis
-
max time kernel
151s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
03-05-2023 21:27
Behavioral task
behavioral1
Sample
publish/Ryujinx.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
publish/Ryujinx.exe
Resource
win10v2004-20230221-en
General
-
Target
publish/Ryujinx.exe
-
Size
48.4MB
-
MD5
b0797f9198573f3ff62d1e0137fcdc32
-
SHA1
e94a8393e836c3d8a461fa0b64127a8a082a7c62
-
SHA256
201c6a39fb12daa53ba03b1a557acaedfe3bdd550687b39667c49b156ac926e9
-
SHA512
766f27e2597af2bcdb6233cb972fac128297239ec30c721a59cc22cb9832e6a5ec4f5db1e249978570ec75e6780bf11f9e05d0994fed136da9a32757ac8e1f0a
-
SSDEEP
196608:s7at47TJ7z4OW1pBeGh7byud8a8ypl54+b7nsq2kTTYHpGuC9Kmg9iKpzNWb/Uny:2atW17zli9byoplIMlavMGY1wTvq49GJ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Ryujinx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation Ryujinx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Ryujinx.exepid process 2784 Ryujinx.exe