Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
26/05/2024, 04:58
Static task
static1
Behavioral task
behavioral1
Sample
Free Fire.exe
Resource
win11-20240426-en
General
-
Target
Free Fire.exe
-
Size
10.5MB
-
MD5
d4c186863eabd97d590273223ca616a0
-
SHA1
a21424f88cd8d53296aec934b9b5f3dd755612fd
-
SHA256
54dad801958518339d3b5dd19a4b1d759c0645f6dd4055164d06bd6dada95496
-
SHA512
c3a54bd219afd4460c5f543aebc35a041342d04452ef2a70f605f3c077a76e4354f2b1794e9f2a3aae46a5e51c7371d2eaa9f4f9b29ab56fb92d2dd568aa2823
-
SSDEEP
196608:dCJBYlzkSIEc+waFvtCK4BbCSC3qzF1/goaSZzpBM:cUzkSU+FvV47Ccz/goa03
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3868 crashpad_handler.exe -
Loads dropped DLL 2 IoCs
pid Process 4652 Free Fire.exe 4652 Free Fire.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4652 Free Fire.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4652 wrote to memory of 3868 4652 Free Fire.exe 81 PID 4652 wrote to memory of 3868 4652 Free Fire.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\Free Fire.exe"C:\Users\Admin\AppData\Local\Temp\Free Fire.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\1pxoetcf.b4u\crashpad_handler.exeC:\Users\Admin\AppData\Local\Temp\1pxoetcf.b4u\crashpad_handler.exe --no-rate-limit "--database=C:\Users\Admin\AppData\Local\Google\Play Games\CrashReporting\Crashpad" --url=https://clients2.google.com/cr/report --annotation=prod=Battlestar --annotation=ver=24.1.1687.0 --initial-client-data=0x694,0x698,0x69c,0x674,0x6a0,0x7ffde7b552c8,0x7ffde7b552d8,0x7ffde7b552e82⤵
- Executes dropped EXE
PID:3868
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
961KB
MD57b3f74266ca7cc7329eac63f8368db65
SHA1db49159afcdf3676d6a6bc791f8f7c26ceeeb145
SHA2569335fe5ed02defb1395ab3e02926edbf90205c40d2e8bfb6247df102307ba557
SHA512930c4f1eeba8b1daf62ea3a29458dbcdd58c30c924d4e5ed5dc16073fafa7a8e2887c2e9627f970d197f848637f58b8cca6bd298a066e78c5d8eab7e0995bbb1
-
Filesize
1.1MB
MD5168e890d04cfee8b8420c90d1d229364
SHA1442f93cb1272b93cc3073f8eeb0732a3c60bc5c9
SHA256f37ed95b97a9c6d6d48c2675defaa53e68b487d271e78294d1af3a431ac25b91
SHA51229d4d3d3a880c70c8c44ea1496f09f4ca1bcbe071dd81e8c700a53d070d8240d0d819a9fe356f175554075a089f6945d7f6390fb1dcf4a152c064a71df3fa48a
-
Filesize
4.5MB
MD528f06bc35021d85a98539a035b2c9a71
SHA18d36ecb2b9e5270c1c5ac81bcd9bf858e9f61a8c
SHA256231014af8dbc27ac20b222a00a2c3dfda4e0aa111fb710d7315b5b19e47a2f57
SHA512cfec5eadc5cca9bc48006a80bca181ecf7949a2b9582ff5ca3ea577ec5892a10a8d4897fbc3e6eeb5b4a1b2de3d42d703cd2dae4c982668f93968e2de2e8599e