Analysis
-
max time kernel
93s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 17:01
Static task
static1
Behavioral task
behavioral1
Sample
Palworld_0.1.2.0.exe
Resource
win7-20231215-en
General
-
Target
Palworld_0.1.2.0.exe
-
Size
1.8MB
-
MD5
a54ca6afa4c942162ff41803719537f0
-
SHA1
3252a867a4c6c2622fec6a11dc8310b851ec97a5
-
SHA256
7d4b7a47dae660ee06d4bb012162fc939c224f0fd15846e0d317175ad1487e32
-
SHA512
059247140fbdb8b6d5088392758e55d515a484c629bb65762881a8af78785fca680e0e5c7013ad43a7ab2818d4304910b7b44f224e04db582b881b0d9c8ba774
-
SSDEEP
24576:Y4nXubIQGyxbPV0db26eEMzRVIkyuwygzt18FvyF2PnJSw2+kpSsBKUxqK4JJqrZ:Yqe3f6hZthB6E2xX2+JskUxq1JJdzu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Palworld_0.1.2.0.tmppid process 1164 Palworld_0.1.2.0.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Palworld_0.1.2.0.exedescription pid process target process PID 1820 wrote to memory of 1164 1820 Palworld_0.1.2.0.exe Palworld_0.1.2.0.tmp PID 1820 wrote to memory of 1164 1820 Palworld_0.1.2.0.exe Palworld_0.1.2.0.tmp PID 1820 wrote to memory of 1164 1820 Palworld_0.1.2.0.exe Palworld_0.1.2.0.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\Palworld_0.1.2.0.exe"C:\Users\Admin\AppData\Local\Temp\Palworld_0.1.2.0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\is-5ENIH.tmp\Palworld_0.1.2.0.tmp"C:\Users\Admin\AppData\Local\Temp\is-5ENIH.tmp\Palworld_0.1.2.0.tmp" /SL5="$D0184,896512,0,C:\Users\Admin\AppData\Local\Temp\Palworld_0.1.2.0.exe"2⤵
- Executes dropped EXE
PID:1164
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-5ENIH.tmp\Palworld_0.1.2.0.tmpFilesize
1.9MB
MD5fdca7ac056544e8332283a47f0c02f2e
SHA1573424f3eff76b5d6d76c6da7e6d6c31644dd44d
SHA2569e64f3bbe446e06155d4ec10a8cc0273165edda8b0a63d8a97c27bc2c81e0451
SHA5126fd4e81ef18da1a4389b9c1f6293f84250603a357c0644d527d6e0fdbe4d625125c0f1d5da7ed8d2c295c07b264cfaf41e37186f2a5f5f0ee525df41df43c597
-
memory/1164-6-0x0000000000A40000-0x0000000000A41000-memory.dmpFilesize
4KB
-
memory/1164-9-0x0000000000400000-0x0000000000722000-memory.dmpFilesize
3.1MB
-
memory/1164-12-0x0000000000A40000-0x0000000000A41000-memory.dmpFilesize
4KB
-
memory/1820-2-0x0000000000400000-0x00000000004E8000-memory.dmpFilesize
928KB
-
memory/1820-0-0x0000000000400000-0x00000000004E8000-memory.dmpFilesize
928KB
-
memory/1820-8-0x0000000000400000-0x00000000004E8000-memory.dmpFilesize
928KB