Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/04/2024, 23:05
Behavioral task
behavioral1
Sample
sims-4-updater-v1.3.2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
sims-4-updater-v1.3.2.exe
Resource
win10v2004-20240226-en
General
-
Target
sims-4-updater-v1.3.2.exe
-
Size
18.0MB
-
MD5
6132fc4c43962da1ed50dcfcaf5575e9
-
SHA1
552b98ae53c0995d8fefc2c541f6ea160ad7baf9
-
SHA256
92316f45f3acc2b7b33a12ff54b7f0b252eaed114356fb5423ef200742c2b7cc
-
SHA512
1a76dff4f607778f0ed02e1e141105f72624c761e9695f9d793615f9465cbeecf18fe1331d7cf705abe717bf3900c7d532ba47f28955b098d7c9c22ce29bcc34
-
SSDEEP
393216:r/DfDg8Q9c6Gq3+d9S14UsdJEIWyFlFW8IqBiCG:r/b08QmEOd9SSUsdJEIHXW8DBi/
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
pid Process 752 sims-4-updater-v1.3.2.exe 752 sims-4-updater-v1.3.2.exe 752 sims-4-updater-v1.3.2.exe 752 sims-4-updater-v1.3.2.exe 752 sims-4-updater-v1.3.2.exe 752 sims-4-updater-v1.3.2.exe 752 sims-4-updater-v1.3.2.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1968 wrote to memory of 752 1968 sims-4-updater-v1.3.2.exe 28 PID 1968 wrote to memory of 752 1968 sims-4-updater-v1.3.2.exe 28 PID 1968 wrote to memory of 752 1968 sims-4-updater-v1.3.2.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\sims-4-updater-v1.3.2.exe"C:\Users\Admin\AppData\Local\Temp\sims-4-updater-v1.3.2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\sims-4-updater-v1.3.2.exe"C:\Users\Admin\AppData\Local\Temp\sims-4-updater-v1.3.2.exe"2⤵
- Loads dropped DLL
PID:752
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5cb39eea2ef9ed3674c597d5f0667b5b4
SHA1c133dc6416b3346fa5b0f449d7cc6f7dbf580432
SHA2561627b921934053f1f7d2a19948aee06fac5db8ee8d4182e6f071718d0681f235
SHA5122c65014dc045a2c1e5f52f3fea4967d2169e4a78d41fe56617ce9a4d5b30ebf25043112917ff3d7d152744ddef70475937ae0a7f96785f97dcefafe8e6f14d9c
-
Filesize
4.3MB
MD563a1fa9259a35eaeac04174cecb90048
SHA10dc0c91bcd6f69b80dcdd7e4020365dd7853885a
SHA25614b06796f288bc6599e458fb23a944ab0c843e9868058f02a91d4606533505ed
SHA512896caa053f48b1e4102e0f41a7d13d932a746eea69a894ae564ef5a84ef50890514deca6496e915aae40a500955220dbc1b1016fe0b8bcdde0ad81b2917dea8b
-
Filesize
20KB
MD5d92e6a007fc22a1e218552ebfb65da93
SHA13c9909332e94f7b7386664a90f52730f4027a75a
SHA25603bd3217eae0ef68521b39556e7491292db540f615da873dd8da538693b81862
SHA512b8b0e6052e68c08e558e72c168e4ff318b1907c4dc5fc1cd1104f5cae7cc418293013dabbb30c835a5c35a456e1cb22cc352b7ae40f82b9b7311bb7419d854c7
-
Filesize
20KB
MD550abf0a7ee67f00f247bada185a7661c
SHA10cddac9ac4db3bf10a11d4b79085ef9cb3fb84a1
SHA256f957a4c261506484b53534a9be8931c02ec1a349b3f431a858f8215cecfec3f7
SHA512c2694bb5d103baff1264926a04d2f0fe156b8815a23c3748412a81cc307b71a9236a0e974b5549321014065e393d10228a0f0004df9ba677f03b5d244a64b528
-
Filesize
20KB
MD5de5695f26a0bcb54f59a8bc3f9a4ecef
SHA199c32595f3edc2c58bdb138c3384194831e901d6
SHA256e9539fce90ad8be582b25ab2d5645772c2a5fb195e602ecdbf12b980656e436a
SHA512df635d5d51cdea24885ae9f0406f317ddcf04ecb6bfa26579bb2e256c457057607844ded4b52ff1f5ca25abe29d1eb2b20f1709cf19035d3829f36bbe31f550f
-
Filesize
20KB
MD574c264cffc09d183fcb1555b16ea7e4b
SHA10b5b08cdf6e749b48254ac811ca09ba95473d47c
SHA256a8e2fc077d9a7d2faa85e1e6833047c90b22c6086487b98fc0e6a86b7bf8bf09
SHA512285afbcc39717510ced2ed096d9f77fc438268ecaa59cff3cf167fcc538e90c73c67652046b0ee379e0507d6e346af79d43c51a571c6dd66034f9385a73d00d1
-
Filesize
1.1MB
MD53b337c2d41069b0a1e43e30f891c3813
SHA1ebee2827b5cb153cbbb51c9718da1549fa80fc5c
SHA256c04daeba7e7c4b711d33993ab4c51a2e087f98f4211aea0dcb3a216656ba0ab7
SHA512fdb3012a71221447b35757ed2bdca6ed1f8833b2f81d03aabebd2cd7780a33a9c3d816535d03c5c3edd5aaf11d91156842b380e2a63135e3c7f87193ad211499