Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 00:19
Behavioral task
behavioral1
Sample
rocket league.exe
Resource
win7-20240221-en
General
-
Target
rocket league.exe
-
Size
5.2MB
-
MD5
a66c11e16baaf08400416e305b5118c4
-
SHA1
3d49238bc8e4865871306416ed8d308745aa4fa4
-
SHA256
38992ee97c1b46dc373cdd5f32fb5de1e5bb8da4e81734d84f860dc92fd41cf2
-
SHA512
440a6a8b1de909e3e20fb768ef55596bb530413c4b4df317d8a145be8f1527c0b8788d415f705893b1b1be07a42e80f57f044aa1b1f65197a56b98afe3692de7
-
SSDEEP
98304:onD+rKIDTGpzoLLJ3TbwaVvrZE0IdeyoFQK15W8ASLmbNYJERw1jrTH31DzZGYn:onqeIm9onJ5hrZEReyiU8AdZYJERurTr
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2900 rocket league.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2900 2196 rocket league.exe 29 PID 2196 wrote to memory of 2900 2196 rocket league.exe 29 PID 2196 wrote to memory of 2900 2196 rocket league.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\rocket league.exe"C:\Users\Admin\AppData\Local\Temp\rocket league.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\rocket league.exe"C:\Users\Admin\AppData\Local\Temp\rocket league.exe"2⤵
- Loads dropped DLL
PID:2900
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD511c051f93c922d6b6b4829772f27a5be
SHA142fbdf3403a4bc3d46d348ca37a9f835e073d440
SHA2560eabf135bb9492e561bbbc5602a933623c9e461aceaf6eb1ceced635e363cd5c
SHA5121cdec23486cffcb91098a8b2c3f1262d6703946acf52aa2fe701964fb228d1411d9b6683bd54527860e10affc0e3d3de92a6ecf2c6c8465e9c8b9a7304e2a4a6