Malware Analysis Report

2025-08-05 16:06

Sample ID 240608-lb1dmsaf7t
Target Euro Truck Simulator 2 v1.16.x.x - v1.50.x.x Plus +15 Trainer.exe
SHA256 a9381acdda22cc627242244cebe8a4a68ed2c43d9da804271efd62ed8bb2a0f1
Tags
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

a9381acdda22cc627242244cebe8a4a68ed2c43d9da804271efd62ed8bb2a0f1

Threat Level: Shows suspicious behavior

The file Euro Truck Simulator 2 v1.16.x.x - v1.50.x.x Plus +15 Trainer.exe was found to be: Shows suspicious behavior.

Malicious Activity Summary


.NET Reactor proctector

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-08 09:22

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-08 09:22

Reported

2024-06-08 09:23

Platform

win10-20240404-fr

Max time kernel

12s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Euro Truck Simulator 2 v1.16.x.x - v1.50.x.x Plus +15 Trainer.exe"

Signatures

.NET Reactor proctector

Description Indicator Process Target
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Euro Truck Simulator 2 v1.16.x.x - v1.50.x.x Plus +15 Trainer.exe

"C:\Users\Admin\AppData\Local\Temp\Euro Truck Simulator 2 v1.16.x.x - v1.50.x.x Plus +15 Trainer.exe"

Network

N/A

Files

memory/1688-0-0x00007FFF69763000-0x00007FFF69764000-memory.dmp

memory/1688-1-0x0000014174330000-0x000001417447E000-memory.dmp

memory/1688-2-0x00007FFF69760000-0x00007FFF6A14C000-memory.dmp

memory/1688-3-0x00007FFF69760000-0x00007FFF6A14C000-memory.dmp

memory/1688-4-0x0000014174640000-0x0000014174714000-memory.dmp

memory/1688-5-0x00007FFF69760000-0x00007FFF6A14C000-memory.dmp

memory/1688-6-0x00007FFF69760000-0x00007FFF6A14C000-memory.dmp

memory/1688-7-0x00007FFF69760000-0x00007FFF6A14C000-memory.dmp