Analysis

  • max time kernel
    12s
  • max time network
    30s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/02/2024, 20:47

General

  • Target

    Helltaker.CHS.PATCH.V2.0-ALI213.exe

  • Size

    10.5MB

  • MD5

    14db1765b249fa8b0163976600bc584c

  • SHA1

    400178fa749e34f7c09726a55abda26ed4bb3774

  • SHA256

    b3441e51e1ae2b51b48b51976199b62e88154997e5d75e453e16fee23a117962

  • SHA512

    756503568e2e0f585477225624d6aa0ee6e823b6e3c7e01f46e97179e345831646022737570d827a98c8267c739ca8f1e70f44528593c55af03e2f4ee64d5357

  • SSDEEP

    196608:uxvN5oCoa1/4NJOhtrqNMd1TzTSdNT+6QPl8hrAfjnLB/b+emuLdQ:uFN5oCorJOhtrqNMDTzTSb9clCGjn1js

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Helltaker.CHS.PATCH.V2.0-ALI213.exe
    "C:\Users\Admin\AppData\Local\Temp\Helltaker.CHS.PATCH.V2.0-ALI213.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1188

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\YXLoadDll_9018\RES\YXLOADDLL.DLL

          Filesize

          822KB

          MD5

          a43bf0efe8b3dc0e6ae58ce7df563d0c

          SHA1

          66d79a92607c8242a4e0992529c5fde6e6692bf6

          SHA256

          9ee8d8bbecc952bf3579846fd3adfe3dc7a98dc55995028b4b8c4d3d0519491f

          SHA512

          e12222aa2e053aa12e7172769966849811db9a64e1028b49099aaaed2abe4a5388979d15165cc00d2b19d55b3c193fd999c6e4d3c13502eac792ef1e823ef76b

        • memory/1188-42-0x0000000006420000-0x0000000006421000-memory.dmp

          Filesize

          4KB

        • memory/1188-63-0x0000000006D00000-0x0000000006D01000-memory.dmp

          Filesize

          4KB

        • memory/1188-11-0x0000000006420000-0x0000000006421000-memory.dmp

          Filesize

          4KB

        • memory/1188-13-0x0000000006400000-0x0000000006401000-memory.dmp

          Filesize

          4KB

        • memory/1188-16-0x0000000006D00000-0x0000000006D01000-memory.dmp

          Filesize

          4KB

        • memory/1188-21-0x0000000006D00000-0x0000000006D01000-memory.dmp

          Filesize

          4KB

        • memory/1188-24-0x0000000006D00000-0x0000000006D01000-memory.dmp

          Filesize

          4KB

        • memory/1188-27-0x0000000006D00000-0x0000000006D01000-memory.dmp

          Filesize

          4KB

        • memory/1188-30-0x0000000006D00000-0x0000000006D01000-memory.dmp

          Filesize

          4KB

        • memory/1188-33-0x0000000006D00000-0x0000000006D01000-memory.dmp

          Filesize

          4KB

        • memory/1188-36-0x0000000006D00000-0x0000000006D01000-memory.dmp

          Filesize

          4KB

        • memory/1188-39-0x0000000002870000-0x0000000002871000-memory.dmp

          Filesize

          4KB

        • memory/1188-43-0x0000000006400000-0x0000000006401000-memory.dmp

          Filesize

          4KB

        • memory/1188-0-0x0000000010000000-0x0000000010257000-memory.dmp

          Filesize

          2.3MB

        • memory/1188-5-0x0000000002870000-0x0000000002871000-memory.dmp

          Filesize

          4KB

        • memory/1188-46-0x0000000006D20000-0x0000000006D21000-memory.dmp

          Filesize

          4KB

        • memory/1188-66-0x0000000006D20000-0x0000000006D21000-memory.dmp

          Filesize

          4KB

        • memory/1188-55-0x0000000006D00000-0x0000000006D01000-memory.dmp

          Filesize

          4KB

        • memory/1188-58-0x0000000006D20000-0x0000000006D21000-memory.dmp

          Filesize

          4KB

        • memory/1188-59-0x0000000006D00000-0x0000000006D01000-memory.dmp

          Filesize

          4KB

        • memory/1188-47-0x0000000006D00000-0x0000000006D01000-memory.dmp

          Filesize

          4KB

        • memory/1188-62-0x0000000006D20000-0x0000000006D21000-memory.dmp

          Filesize

          4KB

        • memory/1188-50-0x0000000006D20000-0x0000000006D21000-memory.dmp

          Filesize

          4KB

        • memory/1188-67-0x0000000006D00000-0x0000000006D01000-memory.dmp

          Filesize

          4KB

        • memory/1188-71-0x0000000006D00000-0x0000000006D01000-memory.dmp

          Filesize

          4KB

        • memory/1188-70-0x0000000006D20000-0x0000000006D21000-memory.dmp

          Filesize

          4KB

        • memory/1188-74-0x0000000006D00000-0x0000000006D01000-memory.dmp

          Filesize

          4KB

        • memory/1188-97-0x0000000006D00000-0x0000000006D01000-memory.dmp

          Filesize

          4KB

        • memory/1188-118-0x0000000006D00000-0x0000000006D01000-memory.dmp

          Filesize

          4KB

        • memory/1188-121-0x0000000006D20000-0x0000000006D21000-memory.dmp

          Filesize

          4KB