Analysis

  • max time kernel
    134s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04-05-2024 16:28

General

  • Target

    STAR WARS Battlefront Promo Trainer.exe

  • Size

    1016KB

  • MD5

    50bb53bca004808190e28b100007a6cc

  • SHA1

    ab07609c5ca7d653c2d917bb4bdccac9e4775f39

  • SHA256

    804699df3aadc32fb4fb5ad0b695b005a3bd646858f03aade8872ecf8f7d1e59

  • SHA512

    c6bcf7d15d7c2c1378688532f88b15e21da1e8dd947a27fa0e43f9f6ea6a3c8a6cb589972475553930d7562e4e82d0c41370ac8db25204a0dc06ab0cf78bb7b1

  • SSDEEP

    24576:ynIM87p8e2EVh/FgZ0oZcdLT/0ElVLSlxxaMbfJBV1Ls2wBP:yRZEVhNNTMElxWxxaMDJBV1Ls2wB

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\STAR WARS Battlefront Promo Trainer.exe
    "C:\Users\Admin\AppData\Local\Temp\STAR WARS Battlefront Promo Trainer.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F59A01A8B782D93EA6991BC172CEFFB1

    Filesize

    867B

    MD5

    c5dfb849ca051355ee2dba1ac33eb028

    SHA1

    d69b561148f01c77c54578c10926df5b856976ad

    SHA256

    cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b

    SHA512

    88289cdd2c2dd1f5f4c13ab2cf9bc601fc634b5945309bedf9fc5b96bf21697b4cd6da2f383497825e02272816befbac4f44955282ffbbd4dd0ddc52281082da

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    92d8749060d9ed00424948d625cc1372

    SHA1

    1fb815a22a4b80a6df60aae2e7a57d72b971f562

    SHA256

    622e610e68853a623b8acfdf61c2bec6a600d9249dab6f3e236d0e299fb9acea

    SHA512

    7ee435868b20d57d2d0ab0f3b753147051c220b7b5d5c38602073c4f657add3ddee89234e1af1ebae83fe1ce7be6ba886c74b1643dfad1aada1d604ade81e9b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    30eb9c55e9e8135e41b7faf5c9defefd

    SHA1

    bce9f981459607344579da9a4ae147c46aeb60b2

    SHA256

    57e971cab163522318b156366ef1a4100a0cbec1f8041717f03db2fe270cf955

    SHA512

    199590ef2b59f66289eb562b12fb40a21aa18b4cbbe151440236cefcea9e531d4296f0b1a15eb3ac9d564256b4db3e50b545f2a58a270889656ff89503ef460a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    492eb0451d10926e70e7c45dc772d1ce

    SHA1

    72966c970b729182d0562f5a6be8b61090506ae5

    SHA256

    b60725e227c0b2f317fc94a1563b203ffef96b0acebf928bfb09dd0dc8f9ed3b

    SHA512

    b901e844ecf9bd5656ed5a9d13b1455a2239230b18a26623e0f2e713fa698447b945f4ddf099bac9f6bf351e1809d2693c12c5bfb2c597b884f4cf75b0ad62d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F59A01A8B782D93EA6991BC172CEFFB1

    Filesize

    242B

    MD5

    096fa46406e27c1c69993a94132f7a80

    SHA1

    f1843251294c76329a4050c4f931fd6191be9dd9

    SHA256

    2d232d860dfc3079f2e9eec85888779eb2453324c6a400355a304d0607b6b57f

    SHA512

    f145a30784cb5d1605a06ac49df24f27a1cae46146024dbddcd91e1878dc89a612f7d17cd29358c9dc3e120faf5f5856f09e7c28de746123912a59e029fb0c7d

  • C:\Users\Admin\AppData\Local\Temp\Cab97A0.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar98CF.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\Cheathappens\Debug\STAR WARS Battlefront.debug

    Filesize

    205B

    MD5

    2308e85f35dab40eaa1ee00fceb0dede

    SHA1

    4e43d1969ded9541f3a921322a7a95e67625d90e

    SHA256

    9f03c029d5d5dc3cd110b861f4d0524100e057c29b5187534bd48c849f58b063

    SHA512

    497a30947841a68158ac653708b7882a9893495f2ef920c019f418a433afd3ae1dbb8124fdfa373b41e8de47c82ae20a30baf7aa231deb1840aa08a6874b6c14