Analysis

  • max time kernel
    150s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    27-05-2024 12:52

General

  • Target

    Armored Core VI Fires of Rubicon v1.0-v1.05 Plus 17 Trainer.exe

  • Size

    1.7MB

  • MD5

    bc51edf1fc8886817878dbc4553f045a

  • SHA1

    a53dd3a00cbf269a98c3e01cb230aac2483a84c2

  • SHA256

    ad28a36088a59f42a8b64bfdf9df13d5ec117c2b7053a41659024e9409238b18

  • SHA512

    ec59993299202512ed1602d637dfcad6343d10cb5c0e8ebc9cdf417154f90722eef156be87900191ea83cef66dd79bff7b0e14b9195f0fb0c33f4ebe26185e75

  • SSDEEP

    24576:i7/xvZj3CImQl/qaa7twNlj11X9U2BBd1ReDlaDSVXT5XdRh8d6ya:iNvwImsyaa7WdXlr7kXT5XdRqc1

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Armored Core VI Fires of Rubicon v1.0-v1.05 Plus 17 Trainer.exe
    "C:\Users\Admin\AppData\Local\Temp\Armored Core VI Fires of Rubicon v1.0-v1.05 Plus 17 Trainer.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d88814410d9c30dc4a7a4975740d08ff

    SHA1

    b8d92d8660f9554ce301030e1c0889c995e74de1

    SHA256

    fcb1d04966619930dda261303aa69fc69b49b6f9534a4c5f1a209cf3a52138d5

    SHA512

    adaca06a89c7cd2e614a6a877b73df39e2c2ee3bb65622bdb2fd8a44fa543c155d3afc27d6f92b206c7642dd66816babc38620a193db1402d260fcdce89bca38

  • C:\Users\Admin\AppData\Local\Temp\Cab1788.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar1808.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • memory/1612-5-0x000007FEF55C0000-0x000007FEF5FAC000-memory.dmp

    Filesize

    9.9MB

  • memory/1612-1-0x0000000001B70000-0x0000000001BA4000-memory.dmp

    Filesize

    208KB

  • memory/1612-0-0x000007FEF55C3000-0x000007FEF55C4000-memory.dmp

    Filesize

    4KB

  • memory/1612-7-0x0000000001BC0000-0x0000000001BCA000-memory.dmp

    Filesize

    40KB

  • memory/1612-6-0x0000000001BC0000-0x0000000001BCA000-memory.dmp

    Filesize

    40KB

  • memory/1612-8-0x000007FEF55C0000-0x000007FEF5FAC000-memory.dmp

    Filesize

    9.9MB

  • memory/1612-12-0x000007FEF55C0000-0x000007FEF5FAC000-memory.dmp

    Filesize

    9.9MB

  • memory/1612-3-0x000007FEF55C0000-0x000007FEF5FAC000-memory.dmp

    Filesize

    9.9MB

  • memory/1612-2-0x000007FEF55C0000-0x000007FEF5FAC000-memory.dmp

    Filesize

    9.9MB

  • memory/1612-4-0x000007FEF55C0000-0x000007FEF5FAC000-memory.dmp

    Filesize

    9.9MB

  • memory/1612-93-0x000007FEF55C3000-0x000007FEF55C4000-memory.dmp

    Filesize

    4KB

  • memory/1612-94-0x000007FEF55C0000-0x000007FEF5FAC000-memory.dmp

    Filesize

    9.9MB

  • memory/1612-95-0x000007FEF55C0000-0x000007FEF5FAC000-memory.dmp

    Filesize

    9.9MB

  • memory/1612-96-0x000007FEF55C0000-0x000007FEF5FAC000-memory.dmp

    Filesize

    9.9MB

  • memory/1612-97-0x000007FEF55C0000-0x000007FEF5FAC000-memory.dmp

    Filesize

    9.9MB

  • memory/1612-98-0x0000000001BC0000-0x0000000001BCA000-memory.dmp

    Filesize

    40KB

  • memory/1612-99-0x0000000001BC0000-0x0000000001BCA000-memory.dmp

    Filesize

    40KB

  • memory/1612-100-0x000007FEF55C0000-0x000007FEF5FAC000-memory.dmp

    Filesize

    9.9MB

  • memory/1612-101-0x000007FEF55C0000-0x000007FEF5FAC000-memory.dmp

    Filesize

    9.9MB