Resubmissions

24-02-2024 07:04

240224-hv5wpacg49 10

24-02-2024 07:00

240224-hs3njsde3w 10

Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    24-02-2024 07:00

General

  • Target

    Dying Light 2 Stay Human v1.0.3-v1.14.0 Plus 21 Trainer.exe

  • Size

    1.3MB

  • MD5

    eefd6641aca0cc297639e36480681ee7

  • SHA1

    dd4e9d80a905be8b150758e8ff43d842737e3316

  • SHA256

    41890043e0f622a2c99a2e4d8643f73d89e7291cdffb74ba472c1e03bef57fce

  • SHA512

    3fb6a18777b5d0b66af109d9700fc2f089d1d1761df0af799a34182db835630480d4a03e3daa57811f8d73546b0b2cf0ab0e8adadacec95fb5de695bbcf627af

  • SSDEEP

    24576:qdkmJRnGLLV+ZUlrWFOueBhPmjzi2DSVXT5XdMcR7vpya:eJRnGLLiUXhPmIXT5XdMyl1

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Dying Light 2 Stay Human v1.0.3-v1.14.0 Plus 21 Trainer.exe
    "C:\Users\Admin\AppData\Local\Temp\Dying Light 2 Stay Human v1.0.3-v1.14.0 Plus 21 Trainer.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2156
  • C:\Windows\system32\verclsid.exe
    "C:\Windows\system32\verclsid.exe" /S /C {0B2C9183-C9FA-4C53-AE21-C900B0C39965} /I {0C733A8A-2A1C-11CE-ADE5-00AA0044773D} /X 0x401
    1⤵
      PID:108
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
      1⤵
        PID:1924

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        f4164ad54d64f5ee4540f43f17da9d84

        SHA1

        e7cf10489a718e3363b89def31d648a44734fc7c

        SHA256

        50a532b6cd8014bf456f034186c54d172db90a0d35af2f8520f43084d630d45c

        SHA512

        d829d36fe774d59a57a4d2e7294fc45d864d6201dd845abf81293330ba7838ed59ccedd21d28db60b9e8daa0603b145571f68e877529fbdda9ffdde5e1c2fa19

      • C:\Users\Admin\AppData\Local\Temp\Cab13D1.tmp

        Filesize

        65KB

        MD5

        ac05d27423a85adc1622c714f2cb6184

        SHA1

        b0fe2b1abddb97837ea0195be70ab2ff14d43198

        SHA256

        c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

        SHA512

        6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

      • C:\Users\Admin\AppData\Local\Temp\Tar148F.tmp

        Filesize

        171KB

        MD5

        9c0c641c06238516f27941aa1166d427

        SHA1

        64cd549fb8cf014fcd9312aa7a5b023847b6c977

        SHA256

        4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

        SHA512

        936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

      • memory/2156-3-0x0000000002210000-0x0000000002290000-memory.dmp

        Filesize

        512KB

      • memory/2156-5-0x0000000000720000-0x000000000072A000-memory.dmp

        Filesize

        40KB

      • memory/2156-6-0x0000000002210000-0x0000000002290000-memory.dmp

        Filesize

        512KB

      • memory/2156-4-0x0000000000720000-0x000000000072A000-memory.dmp

        Filesize

        40KB

      • memory/2156-10-0x0000000002210000-0x0000000002290000-memory.dmp

        Filesize

        512KB

      • memory/2156-0-0x00000000006F0000-0x0000000000724000-memory.dmp

        Filesize

        208KB

      • memory/2156-2-0x0000000002210000-0x0000000002290000-memory.dmp

        Filesize

        512KB

      • memory/2156-1-0x000007FEF55D0000-0x000007FEF5FBC000-memory.dmp

        Filesize

        9.9MB

      • memory/2156-91-0x000007FEF55D0000-0x000007FEF5FBC000-memory.dmp

        Filesize

        9.9MB

      • memory/2156-92-0x0000000002210000-0x0000000002290000-memory.dmp

        Filesize

        512KB

      • memory/2156-93-0x0000000002210000-0x0000000002290000-memory.dmp

        Filesize

        512KB

      • memory/2156-96-0x000007FEF55D0000-0x000007FEF5FBC000-memory.dmp

        Filesize

        9.9MB