Analysis

  • max time kernel
    150s
  • max time network
    138s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-en
  • resource tags

    arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22-03-2024 16:18

General

  • Target

    Total War Warhammer II v1.0-v1.12.1 Build 20236 Plus 21 Trainer.exe

  • Size

    1.2MB

  • MD5

    df53ddd4de3c0cdf8fffe3243fae7c01

  • SHA1

    ceeb776f959a7fa409694ea8b81e8bac22585435

  • SHA256

    c1fd7bcce2f75ad30a83ccec0b36f805af32da6bda0d7b95602278646ce9efc9

  • SHA512

    45d360bb550ce68a1c82ae014d78d735f6beac7ad102f612d1d87e0cf5a98237f1aabbcdc23636fb209a96056707c47a1b4f50ab8f5799abae4fb51beee82da3

  • SSDEEP

    24576:o3UUoG8GP0tlDbyTf6x8MbpQSIHDMybJ7uDS81:OWmGD+TSG/SIHhV7

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Total War Warhammer II v1.0-v1.12.1 Build 20236 Plus 21 Trainer.exe
    "C:\Users\Admin\AppData\Local\Temp\Total War Warhammer II v1.0-v1.12.1 Build 20236 Plus 21 Trainer.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4220

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4220-2-0x000001D641FC0000-0x000001D641FF2000-memory.dmp

    Filesize

    200KB

  • memory/4220-5-0x00007FFC6B260000-0x00007FFC6BC4C000-memory.dmp

    Filesize

    9.9MB

  • memory/4220-6-0x000001D65A940000-0x000001D65A950000-memory.dmp

    Filesize

    64KB

  • memory/4220-7-0x000001D65A940000-0x000001D65A950000-memory.dmp

    Filesize

    64KB

  • memory/4220-8-0x000001D65A940000-0x000001D65A950000-memory.dmp

    Filesize

    64KB

  • memory/4220-9-0x000001D65EB90000-0x000001D65EB98000-memory.dmp

    Filesize

    32KB

  • memory/4220-10-0x000001D65A940000-0x000001D65A950000-memory.dmp

    Filesize

    64KB

  • memory/4220-11-0x000001D65EC10000-0x000001D65EC48000-memory.dmp

    Filesize

    224KB

  • memory/4220-26-0x00007FFC6B260000-0x00007FFC6BC4C000-memory.dmp

    Filesize

    9.9MB

  • memory/4220-27-0x000001D65A940000-0x000001D65A950000-memory.dmp

    Filesize

    64KB

  • memory/4220-28-0x000001D65A940000-0x000001D65A950000-memory.dmp

    Filesize

    64KB

  • memory/4220-29-0x000001D65A940000-0x000001D65A950000-memory.dmp

    Filesize

    64KB

  • memory/4220-30-0x000001D65A940000-0x000001D65A950000-memory.dmp

    Filesize

    64KB