Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-02-2024 01:03

General

  • Target

    Resident Evil 4 v1.0-v20230424 Plus 36 Trainer.exe

  • Size

    1.6MB

  • MD5

    bcacc9b5f549ea9f84b329bb2fdf9293

  • SHA1

    e5e6b61d29a99deb53d69ef72e1153bbf0beeb55

  • SHA256

    eabc658deece003f4e76ef76fd0932a0a2d91e63725bb11daf07dc7052689b76

  • SHA512

    86a385a22595129c3059c834a175c303b722f197a59a12bb96a96d01998ca0e8eff5a27552f4921745b7e015b98b4ad46b277099927af89249ce79b22b706483

  • SSDEEP

    24576:2inUIrP+Zeb+NKgNqRB+uCny6Dorar3QrLamx4wlKDSVXT5Xzwya:2iZGXN3IB+Tny6cGlwlfXT5Xzw1

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Resident Evil 4 v1.0-v20230424 Plus 36 Trainer.exe
    "C:\Users\Admin\AppData\Local\Temp\Resident Evil 4 v1.0-v20230424 Plus 36 Trainer.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:636

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\FLiNGTrainer.tmp

    Filesize

    183KB

    MD5

    c88587a6ac55f6f358e5058121a0dc11

    SHA1

    557ac4a959d147779ce5085671818ce78a43d602

    SHA256

    c669f0121cb9c9cdadef5637402b993716b229e8cafb2d8eb2d5d4353f182226

    SHA512

    83f81f1ba248914a71b5b30c997eda4296e5d4d369089698858dfad25b1c86718c69ecb2582706aebe36be1db942190659e1cec4cbfc53ead960934cc44487f0

  • memory/636-2-0x0000025D00000000-0x0000025D00034000-memory.dmp

    Filesize

    208KB

  • memory/636-5-0x00007FFE65500000-0x00007FFE65FC1000-memory.dmp

    Filesize

    10.8MB

  • memory/636-6-0x0000025C99A30000-0x0000025C99A40000-memory.dmp

    Filesize

    64KB

  • memory/636-7-0x0000025C99A30000-0x0000025C99A40000-memory.dmp

    Filesize

    64KB

  • memory/636-8-0x0000025C99A30000-0x0000025C99A40000-memory.dmp

    Filesize

    64KB

  • memory/636-9-0x0000025C99A30000-0x0000025C99A40000-memory.dmp

    Filesize

    64KB

  • memory/636-10-0x0000025CFFBA0000-0x0000025CFFBA8000-memory.dmp

    Filesize

    32KB

  • memory/636-12-0x00007FFE65500000-0x00007FFE65FC1000-memory.dmp

    Filesize

    10.8MB