Analysis

  • max time kernel
    144s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01-03-2024 21:14

General

  • Target

    Wild Hearts v1.0.2-v1.3.0 Plus 37 Trainer.exe

  • Size

    1.3MB

  • MD5

    bb15d0c336f73fc9c8fe1d675a218fb9

  • SHA1

    63038db54838ec0eceb917e56d69c1a024096ca6

  • SHA256

    ba851696e371fb5168687c362a74bbca8f3a09fa5b7999f9c7b5294b39f2e92c

  • SHA512

    b12efc97b52eb0b7a21f85bde1c53ba0e239a870be4ed83a45c579bf67e2533d90db7f484704ac4f91730a752393fdf3fafb18a28eb75b10dfda29288672d3c2

  • SSDEEP

    24576:DbsT8+hPULj6gh0yXGlkDXbhAFGvy6PNDSVXT5Xdqt3ya:vGhPULjXhBXxfhAFGvAXT5XK1

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Wild Hearts v1.0.2-v1.3.0 Plus 37 Trainer.exe
    "C:\Users\Admin\AppData\Local\Temp\Wild Hearts v1.0.2-v1.3.0 Plus 37 Trainer.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2108
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:1060
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe"
      1⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2176
    • C:\Windows\System32\rundll32.exe
      "C:\Windows\System32\rundll32.exe" shell32.dll,Options_RunDLL 1
      1⤵
        PID:3044

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

        Filesize

        67KB

        MD5

        753df6889fd7410a2e9fe333da83a429

        SHA1

        3c425f16e8267186061dd48ac1c77c122962456e

        SHA256

        b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

        SHA512

        9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        5611a11c4dd5ab6a99316d02ecab806e

        SHA1

        883fe4867ed0a5ddd4299c0e274b2aa0145603ac

        SHA256

        7a5811fe522a8ef9586679b3c8677314ce6c97f89bb795e4875350451ec733c8

        SHA512

        1aceace57985c63ee5a2518df856959cf3b222f1165f64781f1005f274b0a652c112e7b84f107aee101281c1c1872ec2ba0777abe0fe8abdfa5b68646ee310ab

      • C:\Users\Admin\AppData\Local\Temp\Cab4DF3.tmp

        Filesize

        65KB

        MD5

        ac05d27423a85adc1622c714f2cb6184

        SHA1

        b0fe2b1abddb97837ea0195be70ab2ff14d43198

        SHA256

        c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

        SHA512

        6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

      • C:\Users\Admin\AppData\Local\Temp\Tar4FAF.tmp

        Filesize

        175KB

        MD5

        dd73cead4b93366cf3465c8cd32e2796

        SHA1

        74546226dfe9ceb8184651e920d1dbfb432b314e

        SHA256

        a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

        SHA512

        ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

      • memory/2108-139-0x000007FEF5A00000-0x000007FEF63EC000-memory.dmp

        Filesize

        9.9MB

      • memory/2108-142-0x00000000002F0000-0x00000000002FA000-memory.dmp

        Filesize

        40KB

      • memory/2108-8-0x00000000002F0000-0x00000000002FA000-memory.dmp

        Filesize

        40KB

      • memory/2108-7-0x00000000002F0000-0x00000000002FA000-memory.dmp

        Filesize

        40KB

      • memory/2108-3-0x000007FEF5A00000-0x000007FEF63EC000-memory.dmp

        Filesize

        9.9MB

      • memory/2108-4-0x000000001B070000-0x000000001B0F0000-memory.dmp

        Filesize

        512KB

      • memory/2108-2-0x0000000001D40000-0x0000000001D74000-memory.dmp

        Filesize

        208KB

      • memory/2108-140-0x000000001B070000-0x000000001B0F0000-memory.dmp

        Filesize

        512KB

      • memory/2108-141-0x000000001B070000-0x000000001B0F0000-memory.dmp

        Filesize

        512KB

      • memory/2108-9-0x000000001B070000-0x000000001B0F0000-memory.dmp

        Filesize

        512KB

      • memory/2108-143-0x00000000002F0000-0x00000000002FA000-memory.dmp

        Filesize

        40KB

      • memory/2108-144-0x000000001B070000-0x000000001B0F0000-memory.dmp

        Filesize

        512KB

      • memory/2108-151-0x000007FEF5A00000-0x000007FEF63EC000-memory.dmp

        Filesize

        9.9MB

      • memory/2108-150-0x00000000002F0000-0x00000000002F2000-memory.dmp

        Filesize

        8KB

      • memory/2176-147-0x0000000140000000-0x00000001405E8000-memory.dmp

        Filesize

        5.9MB

      • memory/2176-148-0x0000000140000000-0x00000001405E8000-memory.dmp

        Filesize

        5.9MB

      • memory/2176-145-0x0000000140000000-0x00000001405E8000-memory.dmp

        Filesize

        5.9MB

      • memory/2176-146-0x0000000140000000-0x00000001405E8000-memory.dmp

        Filesize

        5.9MB