Analysis

  • max time kernel
    150s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-05-2024 12:52

General

  • Target

    Armored Core VI Fires of Rubicon v1.0-v1.05 Plus 17 Trainer.exe

  • Size

    1.7MB

  • MD5

    bc51edf1fc8886817878dbc4553f045a

  • SHA1

    a53dd3a00cbf269a98c3e01cb230aac2483a84c2

  • SHA256

    ad28a36088a59f42a8b64bfdf9df13d5ec117c2b7053a41659024e9409238b18

  • SHA512

    ec59993299202512ed1602d637dfcad6343d10cb5c0e8ebc9cdf417154f90722eef156be87900191ea83cef66dd79bff7b0e14b9195f0fb0c33f4ebe26185e75

  • SSDEEP

    24576:i7/xvZj3CImQl/qaa7twNlj11X9U2BBd1ReDlaDSVXT5XdRh8d6ya:iNvwImsyaa7WdXlr7kXT5XdRqc1

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Armored Core VI Fires of Rubicon v1.0-v1.05 Plus 17 Trainer.exe
    "C:\Users\Admin\AppData\Local\Temp\Armored Core VI Fires of Rubicon v1.0-v1.05 Plus 17 Trainer.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:228

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/228-0-0x00007FFEC4133000-0x00007FFEC4135000-memory.dmp

    Filesize

    8KB

  • memory/228-1-0x0000022BF8D80000-0x0000022BF8DB4000-memory.dmp

    Filesize

    208KB

  • memory/228-2-0x00007FFEC4130000-0x00007FFEC4BF1000-memory.dmp

    Filesize

    10.8MB

  • memory/228-3-0x00007FFEC4130000-0x00007FFEC4BF1000-memory.dmp

    Filesize

    10.8MB

  • memory/228-4-0x00007FFEC4130000-0x00007FFEC4BF1000-memory.dmp

    Filesize

    10.8MB

  • memory/228-5-0x00007FFEC4130000-0x00007FFEC4BF1000-memory.dmp

    Filesize

    10.8MB

  • memory/228-6-0x00007FFEC4130000-0x00007FFEC4BF1000-memory.dmp

    Filesize

    10.8MB

  • memory/228-7-0x0000022BFEAE0000-0x0000022BFEAE8000-memory.dmp

    Filesize

    32KB

  • memory/228-9-0x0000022BFB170000-0x0000022BFB17E000-memory.dmp

    Filesize

    56KB

  • memory/228-8-0x0000022BFB1A0000-0x0000022BFB1D8000-memory.dmp

    Filesize

    224KB

  • memory/228-22-0x00007FFEC4133000-0x00007FFEC4135000-memory.dmp

    Filesize

    8KB

  • memory/228-23-0x00007FFEC4130000-0x00007FFEC4BF1000-memory.dmp

    Filesize

    10.8MB

  • memory/228-24-0x00007FFEC4130000-0x00007FFEC4BF1000-memory.dmp

    Filesize

    10.8MB

  • memory/228-25-0x00007FFEC4130000-0x00007FFEC4BF1000-memory.dmp

    Filesize

    10.8MB

  • memory/228-26-0x00007FFEC4130000-0x00007FFEC4BF1000-memory.dmp

    Filesize

    10.8MB