Analysis

  • max time kernel
    150s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-03-2024 16:18

General

  • Target

    Total War Warhammer II v1.0-v1.12.1 Build 20236 Plus 21 Trainer.exe

  • Size

    1.2MB

  • MD5

    df53ddd4de3c0cdf8fffe3243fae7c01

  • SHA1

    ceeb776f959a7fa409694ea8b81e8bac22585435

  • SHA256

    c1fd7bcce2f75ad30a83ccec0b36f805af32da6bda0d7b95602278646ce9efc9

  • SHA512

    45d360bb550ce68a1c82ae014d78d735f6beac7ad102f612d1d87e0cf5a98237f1aabbcdc23636fb209a96056707c47a1b4f50ab8f5799abae4fb51beee82da3

  • SSDEEP

    24576:o3UUoG8GP0tlDbyTf6x8MbpQSIHDMybJ7uDS81:OWmGD+TSG/SIHhV7

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Total War Warhammer II v1.0-v1.12.1 Build 20236 Plus 21 Trainer.exe
    "C:\Users\Admin\AppData\Local\Temp\Total War Warhammer II v1.0-v1.12.1 Build 20236 Plus 21 Trainer.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9b657e91b37b43ce9f3ab87baa052abd

    SHA1

    6c9a17c8c7518e9d2a87921cfebc0b3e8fe55e0c

    SHA256

    34c94b90f46d4d1a5d964fbb1083ed525f6b7663ae65c03c3b96aa83203dd915

    SHA512

    a54d4d9b14ab1e7a646371f47a6a6542ebf23c26ac6ab34043b4b223873d4a2bd3e05eeaa9f6b12716140fc342ed6e7410da3e1a97acf1bbe7bacf5402d357de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d45638f83ad6102a3cce452788700f50

    SHA1

    48093ad2d12b0676ac544b55e89038a29f94037d

    SHA256

    ee2998dd698208c19ace83c0c76cf8d19e08e34115587427a4608b689658a3de

    SHA512

    d2d00c67fe468a2e52cd453614c051e51580744557836abcdae0f2cd531d9ff3ba99cbca66490aee2d894b3e7406d70e0c4a2545107ca0cc77004a77623ab66a

  • C:\Users\Admin\AppData\Local\Temp\Cab9A1F.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar9C39.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

  • memory/2460-14-0x000000001AF90000-0x000000001B010000-memory.dmp

    Filesize

    512KB

  • memory/2460-5-0x000007FEF6020000-0x000007FEF6A0C000-memory.dmp

    Filesize

    9.9MB

  • memory/2460-8-0x0000000000180000-0x000000000018A000-memory.dmp

    Filesize

    40KB

  • memory/2460-2-0x0000000001DE0000-0x0000000001E12000-memory.dmp

    Filesize

    200KB

  • memory/2460-7-0x000000001AF90000-0x000000001B010000-memory.dmp

    Filesize

    512KB

  • memory/2460-9-0x0000000000180000-0x000000000018A000-memory.dmp

    Filesize

    40KB

  • memory/2460-6-0x000000001AF90000-0x000000001B010000-memory.dmp

    Filesize

    512KB

  • memory/2460-10-0x000000001AF90000-0x000000001B010000-memory.dmp

    Filesize

    512KB

  • memory/2460-121-0x000007FEF6020000-0x000007FEF6A0C000-memory.dmp

    Filesize

    9.9MB

  • memory/2460-122-0x000000001AF90000-0x000000001B010000-memory.dmp

    Filesize

    512KB

  • memory/2460-123-0x000000001AF90000-0x000000001B010000-memory.dmp

    Filesize

    512KB

  • memory/2460-124-0x0000000000180000-0x000000000018A000-memory.dmp

    Filesize

    40KB

  • memory/2460-125-0x0000000000180000-0x000000000018A000-memory.dmp

    Filesize

    40KB

  • memory/2460-126-0x000000001AF90000-0x000000001B010000-memory.dmp

    Filesize

    512KB