Analysis

  • max time kernel
    31s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 10:17

General

  • Target

    warcraft3_keygen.exe

  • Size

    148KB

  • MD5

    365fa1fef8811139c1ddcd9e07d73741

  • SHA1

    ba62602b0dbac7bec3a70fa454327a14f7986793

  • SHA256

    6e33d491f69059e71c44d0ff5d50448e2c568e0484ff42ba28ac79eb67bf2a70

  • SHA512

    cfbf44a16209974795759ebd01ffb6bee3f32b0bb61879013e3429fcc4db820d898bd439a122b4df8c7e55d3a41e5a5cedb4b13975c22462cc754d8a4185e3f1

  • SSDEEP

    3072:oGbZMZuq4wEw9J1YpwN+VrG9CmBo2h4oCVi:zbZoufwEeLjyrUph4oSi

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\warcraft3_keygen.exe
    "C:\Users\Admin\AppData\Local\Temp\warcraft3_keygen.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    PID:1644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1644-1-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1644-2-0x0000000000430000-0x0000000000452000-memory.dmp

    Filesize

    136KB

  • memory/1644-0-0x0000000000430000-0x0000000000452000-memory.dmp

    Filesize

    136KB

  • memory/1644-3-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB