Analysis
-
max time kernel
135s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2023 15:35
Behavioral task
behavioral1
Sample
Ryujinx.exe
Resource
win7-20230220-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
Ryujinx.exe
Resource
win10v2004-20230220-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
Ryujinx.exe
-
Size
48.4MB
-
MD5
eb2f18a268ba03a2461ae885eeeeb98e
-
SHA1
951a04456e55dcb10565f427c12da083a4f49627
-
SHA256
7fc18fe6cea197b84f079605c85a39bb79b73eef015522ffe280f4c5d013fd00
-
SHA512
1a1399ebc758d7d1837aaf44380258f42b8e6896499b9a3c5923232b6a8061096e70a742554b898609823e785f5090050ce3b57afae1af70942c6e93f84ba175
-
SSDEEP
393216:2atW17zli9byRHIMlavMzhVQN9mIvyNi49Gmg:Tsk9y9x5hVQN9mIv0i49Gmg
Score
7/10
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation Ryujinx.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1420 2160 WerFault.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ryujinx.exe"C:\Users\Admin\AppData\Local\Temp\Ryujinx.exe"1⤵
- Checks computer location settings
PID:2160 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2160 -s 13042⤵
- Program crash
PID:1420
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 416 -p 2160 -ip 21601⤵PID:1424