Resubmissions

23-02-2024 03:15

240223-dr675aad5y 10

23-02-2024 03:12

240223-dp572sad4x 10

Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23-02-2024 03:12

General

  • Target

    Hades v1.0-v1.38 Plus 15 Trainer x64.exe

  • Size

    1.4MB

  • MD5

    d6af8282fe43619a2854dcbb062e5fc5

  • SHA1

    fa2f9972ef8fd64cdbce1764f5846aed1e644973

  • SHA256

    41ce8c8837bc90a3097417346b5e96616a73b34cd00b1d79d90cb9bdeb29c83f

  • SHA512

    db84040f8ee47bc14b00b1690471a1445e09633252894a31116e24b5061450dee687b47e164bdd58f019edaa2b8e233017829b5260d2e0ce7724910f63ba8734

  • SSDEEP

    24576:N9/QSW61N8Lqpgz7R0Ahn5nRQfbJ7MiYPDS/:OeyepURPh5nRQfV7

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Hades v1.0-v1.38 Plus 15 Trainer x64.exe
    "C:\Users\Admin\AppData\Local\Temp\Hades v1.0-v1.38 Plus 15 Trainer x64.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2072
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2072 -s 820
      2⤵
        PID:1960

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2072-0-0x0000000001B70000-0x0000000001BA2000-memory.dmp

      Filesize

      200KB

    • memory/2072-1-0x000007FEF53F0000-0x000007FEF5DDC000-memory.dmp

      Filesize

      9.9MB

    • memory/2072-2-0x000000001AE30000-0x000000001AEB0000-memory.dmp

      Filesize

      512KB

    • memory/2072-3-0x000000001AE30000-0x000000001AEB0000-memory.dmp

      Filesize

      512KB

    • memory/2072-4-0x000000001AE30000-0x000000001AEB0000-memory.dmp

      Filesize

      512KB

    • memory/2072-5-0x000000001AE30000-0x000000001AEB0000-memory.dmp

      Filesize

      512KB

    • memory/2072-9-0x000000001AE30000-0x000000001AEB0000-memory.dmp

      Filesize

      512KB

    • memory/2072-10-0x000007FEF53F0000-0x000007FEF5DDC000-memory.dmp

      Filesize

      9.9MB

    • memory/2072-11-0x000000001AE30000-0x000000001AEB0000-memory.dmp

      Filesize

      512KB

    • memory/2072-12-0x000000001AE30000-0x000000001AEB0000-memory.dmp

      Filesize

      512KB