Analysis

  • max time kernel
    147s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-03-2024 18:21

General

  • Target

    Balatro.v1.0.0L-Unleashed/luasteam.dll

  • Size

    189KB

  • MD5

    3a9684714ccd9f25a9a6d94de9972f8b

  • SHA1

    694380cc1b4fe03d6d7def8384b9ec6c62ae2949

  • SHA256

    737d63541c206e5f88298022c48c7205b0fc72a07cf051a354a6fae2bcd88f49

  • SHA512

    d227eec2d8bfca1afef5bc89a5b6a1ee81edc731793fa4bf91edfd824f3b3bc969bf663b18de97aa0ee2d3b999ae40e2a81a1d9a828f0324c5a0880fc5a037a2

  • SSDEEP

    3072:WXEgpcnvT+hGh9D9z3rQ4Glx4XHz/Y0kyDp1VhfYfPkuZMgRs:8OsGh9DhEHlqD+E1wkCJi

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\Balatro.v1.0.0L-Unleashed\luasteam.dll,#1
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    PID:2180

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Balatro.v1.0.0L-Unleashed\steam_api.ini

    Filesize

    1KB

    MD5

    cbb59177483e53188a9771db07561997

    SHA1

    f62578c74f24e903a9ad17dc2e9440fbc7f8b575

    SHA256

    bb0bc67afa9beac2ed85b5969d4dfc3e3aeba5b9c2c9617c4aa2534faf2f155f

    SHA512

    9d38b99b8adff57403cf61a4d7722e7e28592dc2862603b6755b91620b2ee56064d2d0458dbd4a76c907519c1ecdcba2de3f3974068dace6ae239842679070c6

  • C:\Users\Admin\AppData\Local\Temp\tier0_s64.dll

    Filesize

    291KB

    MD5

    cc7470b39ac697d9a9d2d43f5c30093c

    SHA1

    542d7574b76c16b35912fa8f6a4435b44525aacf

    SHA256

    a3ccbe0f56e4af7a06a1279bc5b45bf4893caa67e5467cb5df3b3f681fb850c0

    SHA512

    ed84c34b4c3c7ba95418b2d582bc2dea1ca771e38f5abbd400f0d06ee897ccd47fd8901f7ab3a709340d4706c1fe2791473e6d98a1ffaac6235927b1f758e13b

  • memory/2180-14-0x00007FF91E210000-0x00007FF91E211000-memory.dmp

    Filesize

    4KB