Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:07
Behavioral task
behavioral1
Sample
《刺客信条:枭雄》PC版全版本通用破解补丁/Crack/bink2w64.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
《刺客信条:枭雄》PC版全版本通用破解补丁/Crack/bink2w64.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
《刺客信条:枭雄》PC版全版本通用破解补丁/Crack/uplay_r1_loader64.dll
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
《刺客信条:枭雄》PC版全版本通用破解补丁/Crack/uplay_r1_loader64.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
《刺客信条:枭雄》PC版全版本通用破解补丁/Crack/uplay_r1_loader64.dll
Resource
win7-20240419-en
Behavioral task
behavioral6
Sample
《刺客信条:枭雄》PC版全版本通用破解补丁/Crack/uplay_r1_loader64.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
《刺客信条:枭雄》PC版全版本通用破解补丁/游戏大全.url
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
《刺客信条:枭雄》PC版全版本通用破解补丁/游戏大全.url
Resource
win10v2004-20240226-en
General
-
Target
《刺客信条:枭雄》PC版全版本通用破解补丁/Crack/uplay_r1_loader64.dll
-
Size
887KB
-
MD5
055144df363703f9e9130d23cd1c602b
-
SHA1
4ced1ae53339ec00a444007c7c7fac6a85ab3e1e
-
SHA256
85c219ce4f337cc52efc201f0dcf018a399d976bd2a45d918ead040dc5c9d8ca
-
SHA512
a5a178fdb5e056ec1045a591cb25739604aa498b46a905b004b655d9e9ede59fc48b24c4e0adeb12b7a94632cdd7a871847e5de8878e023d05490e294b9233cc
-
SSDEEP
12288:hS+BmebEh4D4qxR4mFm4DkYI4FG4Z+++RZVfiysrGYnEYcYG1ecSRBFQI3n22Vm0:NTysVnescuzQIXXvH
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral3/memory/2768-1-0x000007FEF75B0000-0x000007FEF7628000-memory.dmp vmprotect behavioral3/memory/2768-3-0x000007FEF75B0000-0x000007FEF7628000-memory.dmp vmprotect behavioral3/memory/2768-7-0x000007FEF75B0000-0x000007FEF7628000-memory.dmp vmprotect -
NTFS ADS 1 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\«????:??»PC??????????\Crack\save3dmgames\saves.ini rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2768 wrote to memory of 620 2768 rundll32.exe WerFault.exe PID 2768 wrote to memory of 620 2768 rundll32.exe WerFault.exe PID 2768 wrote to memory of 620 2768 rundll32.exe WerFault.exe