Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/02/2024, 21:14
Static task
static1
Behavioral task
behavioral1
Sample
Dying_Light_2_Stay_Human_v1.13.3.torrent
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Dying_Light_2_Stay_Human_v1.13.3.torrent
Resource
win10v2004-20231222-en
7 signatures
150 seconds
General
-
Target
Dying_Light_2_Stay_Human_v1.13.3.torrent
-
Size
3.7MB
-
MD5
941b004ac8be177a41d259e9de14a8e6
-
SHA1
d0a4a8f2705c49cd1534d0172e586a1ca3688257
-
SHA256
c2bb249016cf3928917644aa15ad41dfb16d957b9e82b96df8b4e94c92c8c478
-
SHA512
760367d5929c4b968d61cfffd8c998a621789a72cf4dbe16b7292586bdb072609f2e70840c1d418cf064ae67416adec183faca1a5440090cd06eec28e3ae9896
-
SSDEEP
98304:LFmqQOF7iLEtlhKnl5pd5Teyb+HKBQD2zwSdRDKl:LFmqQUCE1Knl5kyyHKVDKl
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2828 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2828 2000 cmd.exe 29 PID 2000 wrote to memory of 2828 2000 cmd.exe 29 PID 2000 wrote to memory of 2828 2000 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Dying_Light_2_Stay_Human_v1.13.3.torrent1⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Dying_Light_2_Stay_Human_v1.13.3.torrent2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2828
-