Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240319-en
  • resource tags

    arch:x64arch:x86image:win11-20240319-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    22-03-2024 16:18

General

  • Target

    Total War Warhammer II v1.0-v1.12.1 Build 20236 Plus 21 Trainer.exe

  • Size

    1.2MB

  • MD5

    df53ddd4de3c0cdf8fffe3243fae7c01

  • SHA1

    ceeb776f959a7fa409694ea8b81e8bac22585435

  • SHA256

    c1fd7bcce2f75ad30a83ccec0b36f805af32da6bda0d7b95602278646ce9efc9

  • SHA512

    45d360bb550ce68a1c82ae014d78d735f6beac7ad102f612d1d87e0cf5a98237f1aabbcdc23636fb209a96056707c47a1b4f50ab8f5799abae4fb51beee82da3

  • SSDEEP

    24576:o3UUoG8GP0tlDbyTf6x8MbpQSIHDMybJ7uDS81:OWmGD+TSG/SIHhV7

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Total War Warhammer II v1.0-v1.12.1 Build 20236 Plus 21 Trainer.exe
    "C:\Users\Admin\AppData\Local\Temp\Total War Warhammer II v1.0-v1.12.1 Build 20236 Plus 21 Trainer.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3460

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3460-2-0x000001D373120000-0x000001D373152000-memory.dmp

    Filesize

    200KB

  • memory/3460-5-0x00007FFA79F20000-0x00007FFA7A9E2000-memory.dmp

    Filesize

    10.8MB

  • memory/3460-6-0x000001D35A8A0000-0x000001D35A8B0000-memory.dmp

    Filesize

    64KB

  • memory/3460-7-0x000001D35A8A0000-0x000001D35A8B0000-memory.dmp

    Filesize

    64KB

  • memory/3460-8-0x000001D35A8A0000-0x000001D35A8B0000-memory.dmp

    Filesize

    64KB

  • memory/3460-9-0x000001D35A8A0000-0x000001D35A8B0000-memory.dmp

    Filesize

    64KB

  • memory/3460-10-0x000001D376E40000-0x000001D376E48000-memory.dmp

    Filesize

    32KB

  • memory/3460-11-0x000001D3774D0000-0x000001D377508000-memory.dmp

    Filesize

    224KB

  • memory/3460-12-0x000001D376E60000-0x000001D376E6E000-memory.dmp

    Filesize

    56KB

  • memory/3460-27-0x00007FFA79F20000-0x00007FFA7A9E2000-memory.dmp

    Filesize

    10.8MB

  • memory/3460-28-0x000001D35A8A0000-0x000001D35A8B0000-memory.dmp

    Filesize

    64KB

  • memory/3460-29-0x000001D35A8A0000-0x000001D35A8B0000-memory.dmp

    Filesize

    64KB

  • memory/3460-30-0x000001D35A8A0000-0x000001D35A8B0000-memory.dmp

    Filesize

    64KB

  • memory/3460-31-0x000001D35A8A0000-0x000001D35A8B0000-memory.dmp

    Filesize

    64KB

  • memory/3460-32-0x000001D35A8A0000-0x000001D35A8B0000-memory.dmp

    Filesize

    64KB