Analysis

  • max time kernel
    134s
  • max time network
    136s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    06-04-2024 15:30

General

  • Target

    phasmophobia.exe

  • Size

    41KB

  • MD5

    13ae295c93eaa000b59487b965371a22

  • SHA1

    7b8d0ffbc829308c7a00983eec9a58518f88ab0f

  • SHA256

    3041d2d0a12a0132944a2b1095dd464dcf66155c2937c232a2e08ab49af53fd7

  • SHA512

    879ed0b42b53c94f0e924d544748ed346c0673731d5ce5a7a385605a916112f0e094036cfec28d3213e62591838469bcdc75450f0824fcaab484be6204667c29

  • SSDEEP

    768:4scaIiIqfT6aGpDXswguZkeqWTj8iKZKfgm3EhEB:fc1ofnGEeqWTAiF7EGB

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/1226190742091862016/FevJ3EY4nZ8U17E0aVVzH2pP-KRB_T9LcZ5HPJ-cza7zSyGVola9JNKI1ocBWhpHwxy8

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\phasmophobia.exe
    "C:\Users\Admin\AppData\Local\Temp\phasmophobia.exe"
    1⤵
    • Looks for VirtualBox Guest Additions in registry
    • Looks for VMWare Tools registry key
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • Checks SCSI registry key(s)
    • Enumerates system info in registry
    PID:2196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2196-0-0x0000000000330000-0x0000000000340000-memory.dmp

    Filesize

    64KB

  • memory/2196-2-0x00007FFB65DB0000-0x00007FFB6679C000-memory.dmp

    Filesize

    9.9MB

  • memory/2196-3-0x00007FFB65DB0000-0x00007FFB6679C000-memory.dmp

    Filesize

    9.9MB