Analysis
-
max time kernel
134s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2023, 20:27
Static task
static1
Behavioral task
behavioral1
Sample
拳皇Wing v1.9.zip
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
拳皇Wing v1.9.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
The King Of Fighters Wing v1.9.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
The King Of Fighters Wing v1.9.exe
Resource
win10v2004-20230220-en
General
-
Target
The King Of Fighters Wing v1.9.exe
-
Size
42.4MB
-
MD5
5c942440ae9bffb033c61a2be54e9ffc
-
SHA1
fd8ab8f1a10adbc21f138da767f32a0854efdc18
-
SHA256
a1dad0820e12360a02538688365463b2b24cdbbbf555f880d3b06392cf3fc222
-
SHA512
5c3dc01ff6b84ecf028c5eddcd33d5d708526cc7d47d248692067e420c0c0dfc5f4ce0b2bf670dc982691fd5be3966c5bcc729f577a72218b03a75859ab2c17c
-
SSDEEP
786432:ndP8Ild37MlFzyHwJrYpbF2hl8iR18V+KuYAVqA74LZ/0j7zAhqde24t5:n5Nld37amkrYKhlx180VqAsLebbz4t5
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 The King Of Fighters Wing v1.9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz The King Of Fighters Wing v1.9.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4528 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4528 AUDIODG.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\The King Of Fighters Wing v1.9.exe"C:\Users\Admin\AppData\Local\Temp\The King Of Fighters Wing v1.9.exe"1⤵
- Checks processor information in registry
PID:2940
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x510 0x5141⤵
- Suspicious use of AdjustPrivilegeToken
PID:4528