Analysis
-
max time kernel
34s -
max time network
6s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
18-04-2024 19:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
GamePingBooster/Setup.exe
Resource
win10-20240404-en
windows10-1703-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
GamePingBooster/Setup.exe
Resource
win10v2004-20240412-en
windows10-2004-x64
3 signatures
150 seconds
Behavioral task
behavioral3
Sample
GamePingBooster/Setup.exe
Resource
win11-20240412-en
windows11-21h2-x64
2 signatures
150 seconds
General
-
Target
GamePingBooster/Setup.exe
-
Size
493KB
-
MD5
979119c0ff7fe623c1115a1a965507d2
-
SHA1
26bda6aa1aef1243aae1da88e986af6c8e990fd1
-
SHA256
84b587ec425746bfa985048f3c189fd96f485759e5cc78d90c8287764b08ae17
-
SHA512
d716badbfd48216a51b0bc0a1b49ce7011d047c8609a2f0cdd25273e4c72222704cdd6071bce1fdc9ba46b042206525dd0fba0e76306ac44c996c4874986da3d
-
SSDEEP
12288:Wx36Rr9pdHMJtOmz448EY3lfEX9ZNNp4bZu32pteE:WR67HHMbrE4BYWqZ06A
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Setup.exedescription pid process target process PID 4080 set thread context of 688 4080 Setup.exe RegAsm.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
Setup.exedescription pid process target process PID 4080 wrote to memory of 688 4080 Setup.exe RegAsm.exe PID 4080 wrote to memory of 688 4080 Setup.exe RegAsm.exe PID 4080 wrote to memory of 688 4080 Setup.exe RegAsm.exe PID 4080 wrote to memory of 688 4080 Setup.exe RegAsm.exe PID 4080 wrote to memory of 688 4080 Setup.exe RegAsm.exe PID 4080 wrote to memory of 688 4080 Setup.exe RegAsm.exe PID 4080 wrote to memory of 688 4080 Setup.exe RegAsm.exe PID 4080 wrote to memory of 688 4080 Setup.exe RegAsm.exe PID 4080 wrote to memory of 688 4080 Setup.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\GamePingBooster\Setup.exe"C:\Users\Admin\AppData\Local\Temp\GamePingBooster\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:688