Analysis

  • max time kernel
    32s
  • max time network
    37s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-05-2023 21:11

General

  • Target

    Ryujinx.exe

  • Size

    48.4MB

  • MD5

    85df4f06329e1423d3d863c6bd3a073d

  • SHA1

    d796603e8ba48cbf350bfe435696333d0c033806

  • SHA256

    dcdaf83e8340a1d97bdf687afb611f6bfdd4e7f46a8be7c83e4fa7c483f90f54

  • SHA512

    773077e98fd8a60d6bfa2c6441478571808cad3fa120274a6b303bce2c16129fb18011dbbb43bed98ca6db700d43bd4bfc3c0b9159bbe9d57a12db46ce6a67ef

  • SSDEEP

    393216:2atW17zliNbyRHIMlavMVAvF9zHenSM1gE:TskNy9xmF9z+nSM1gE

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Program crash 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Ryujinx.exe
    "C:\Users\Admin\AppData\Local\Temp\Ryujinx.exe"
    1⤵
    • Checks computer location settings
    PID:4364
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 4364 -s 1308
      2⤵
      • Program crash
      PID:4984
  • C:\Windows\system32\WerFault.exe
    C:\Windows\system32\WerFault.exe -pss -s 456 -p 4364 -ip 4364
    1⤵
      PID:2216

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads