Analysis

  • max time kernel
    160s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-04-2024 18:07

General

  • Target

    Cuphead v1.3.2 Plus 8 Trainer.exe

  • Size

    1.3MB

  • MD5

    1a6192c1dbd34a4c1b3cc3f92e8b1954

  • SHA1

    40dfedd3a712bc5b918f12e9aa19ae94d5b611c0

  • SHA256

    3b3b74d2ae7cde356bd67fc10cb988b363ab3d8155a4cd90126dfd0e20a84727

  • SHA512

    466b12869ed21721c46070c7f95d7fd6dad0436e5f43285a402321257ec0f08ca3abdcedc7ee6b3e07990efba685dbfc547a3ad9f9bb6e5e1bbeb126b21a090a

  • SSDEEP

    24576:183/DwNbWtvuQXcyCHrbwbb4B8j88DSngtcbJ74A9:yckt2QsdPwe8YycV779

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Cuphead v1.3.2 Plus 8 Trainer.exe
    "C:\Users\Admin\AppData\Local\Temp\Cuphead v1.3.2 Plus 8 Trainer.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:456

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/456-2-0x000001E4EB700000-0x000001E4EB730000-memory.dmp
    Filesize

    192KB

  • memory/456-5-0x00007FF889BA0000-0x00007FF88A661000-memory.dmp
    Filesize

    10.8MB

  • memory/456-6-0x000001E4EBCF0000-0x000001E4EBD00000-memory.dmp
    Filesize

    64KB

  • memory/456-7-0x000001E4EBCF0000-0x000001E4EBD00000-memory.dmp
    Filesize

    64KB

  • memory/456-8-0x000001E4EBCF0000-0x000001E4EBD00000-memory.dmp
    Filesize

    64KB

  • memory/456-9-0x000001E4F1100000-0x000001E4F1108000-memory.dmp
    Filesize

    32KB

  • memory/456-10-0x000001E4EBCF0000-0x000001E4EBD00000-memory.dmp
    Filesize

    64KB

  • memory/456-11-0x000001E4F1790000-0x000001E4F17C8000-memory.dmp
    Filesize

    224KB

  • memory/456-12-0x000001E4F1120000-0x000001E4F112E000-memory.dmp
    Filesize

    56KB

  • memory/456-25-0x00007FF889BA0000-0x00007FF88A661000-memory.dmp
    Filesize

    10.8MB

  • memory/456-26-0x000001E4EBCF0000-0x000001E4EBD00000-memory.dmp
    Filesize

    64KB

  • memory/456-27-0x000001E4EBCF0000-0x000001E4EBD00000-memory.dmp
    Filesize

    64KB

  • memory/456-28-0x000001E4EBCF0000-0x000001E4EBD00000-memory.dmp
    Filesize

    64KB

  • memory/456-29-0x000001E4EBCF0000-0x000001E4EBD00000-memory.dmp
    Filesize

    64KB

  • memory/456-30-0x000001E4EBCF0000-0x000001E4EBD00000-memory.dmp
    Filesize

    64KB