Analysis

  • max time kernel
    131s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-05-2024 05:42

General

  • Target

    tomb_raider_anniversary_plus1-abra.exe

  • Size

    309KB

  • MD5

    c34619906b21b8d696fb525b14682c62

  • SHA1

    4adc83a1fbcf7ff90b7a41213bfe2722a936fa87

  • SHA256

    e7961f28af075e4125cad115379be74cf8633671f59d9a2f0e9fcccac0fc3ace

  • SHA512

    66c2de3df6b3847f1572763c047ca261e904f9948c7fb4f2acc42b02b8647ff67e922c84d986e859d4df8c2f65bb5ec90951aab1e89738e500c39e7b5ea17d79

  • SSDEEP

    3072:jhvxKoP4h1ZRYGMf/cf8JhecfHhxGXWAPBmlDxhq2s0hKZc3R39n87DZZFhzvmus:jR0XYj/cf0rfBYBDkKZWGZF00kL0A

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tomb_raider_anniversary_plus1-abra.exe
    "C:\Users\Admin\AppData\Local\Temp\tomb_raider_anniversary_plus1-abra.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    PID:1760

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\H@tKeysH@@k.DLL

    Filesize

    20KB

    MD5

    116ec20265b00cfe389518e2a0c7ed81

    SHA1

    d04c903ef681bb18dbf337ffa7ff2a9ccc8bedd6

    SHA256

    ef9d09e51c42bc04d48444b2517471ea07f2d8a6a6a2e67dd635b7bf95bf8b7a

    SHA512

    594f32c4e51a87294bcfa1735254d04d5d43a38ad2ab7a39f7157bac75b959ee327053df79ee2993a8a2f4e9faafb5c8868283ae2bac8745cb916d5565171cef