Analysis

  • max time kernel
    51s
  • max time network
    44s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-05-2024 04:15

General

  • Target

    setup_europa_universalis_iv_1.36.6.0_(71197).exe

  • Size

    3.5MB

  • MD5

    cef3933d09af99fce0a09cf776287595

  • SHA1

    90128ccd1d0bc2ddcff61e7af9e10acfcbde961b

  • SHA256

    3188c28bac4a8983542341b7a99c7fb7660147da54d16662733466fb9bf8bf69

  • SHA512

    9a959e7450adee5af37087ac376b4ddb081c8db4bee01f41913df6ced221e113b4601318666d9bf2df5199dbc38680db5c9967397db80a72487f6e025c0ced6a

  • SSDEEP

    49152:cig3JqsCaiN8th/oVNluQagYiVBSB7dbUOLGp4FinoWWug+Hmjv4gB:dspigh+8bwL6pdNZug+Gjvz

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup_europa_universalis_iv_1.36.6.0_(71197).exe
    "C:\Users\Admin\AppData\Local\Temp\setup_europa_universalis_iv_1.36.6.0_(71197).exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4636
    • C:\Users\Admin\AppData\Local\Temp\is-8AGOT.tmp\setup_europa_universalis_iv_1.36.6.0_(71197).tmp
      "C:\Users\Admin\AppData\Local\Temp\is-8AGOT.tmp\setup_europa_universalis_iv_1.36.6.0_(71197).tmp" /SL5="$90056,192512,0,C:\Users\Admin\AppData\Local\Temp\setup_europa_universalis_iv_1.36.6.0_(71197).exe"
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      PID:4932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-8AGOT.tmp\setup_europa_universalis_iv_1.36.6.0_(71197).tmp

    Filesize

    1.3MB

    MD5

    ff5ebf66cddd9913b729de78eeb638c8

    SHA1

    ca23d5639d1c516e3defc8f5b267bb5c040238d5

    SHA256

    abf8d4d522ca94a179d644ec0464474b580ec82441b118b663da3bd879f91d85

    SHA512

    4fa3a2dc8ad68bfffc0e039171d2da71c3c37eade709d5495e825bb53f576180eafee57e3c1f78d7dcc8d26e26cc24e1e99bb494d9b4a55f74f4145eb6e5a05b

  • memory/4636-2-0x00000000006B1000-0x00000000006C2000-memory.dmp

    Filesize

    68KB

  • memory/4636-0-0x00000000006B0000-0x00000000006E9000-memory.dmp

    Filesize

    228KB

  • memory/4636-8-0x00000000006B0000-0x00000000006E9000-memory.dmp

    Filesize

    228KB

  • memory/4636-21-0x00000000006B0000-0x00000000006E9000-memory.dmp

    Filesize

    228KB

  • memory/4932-6-0x0000000000D70000-0x0000000000D71000-memory.dmp

    Filesize

    4KB

  • memory/4932-9-0x0000000000A10000-0x0000000000B62000-memory.dmp

    Filesize

    1.3MB

  • memory/4932-11-0x0000000000A10000-0x0000000000B62000-memory.dmp

    Filesize

    1.3MB

  • memory/4932-12-0x0000000000D70000-0x0000000000D71000-memory.dmp

    Filesize

    4KB

  • memory/4932-14-0x0000000000A10000-0x0000000000B62000-memory.dmp

    Filesize

    1.3MB

  • memory/4932-16-0x0000000000A10000-0x0000000000B62000-memory.dmp

    Filesize

    1.3MB

  • memory/4932-19-0x0000000000A10000-0x0000000000B62000-memory.dmp

    Filesize

    1.3MB