Analysis

  • max time kernel
    47s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 21:29

General

  • Target

    Red Dead Redemption Save Editor.exe

  • Size

    65.0MB

  • MD5

    c2479dbf684fa1172b225a82d622921e

  • SHA1

    57a1d2b2d1f782e285581c8452f5d9e0898aee1f

  • SHA256

    2373365b673a7ccaa72c91211ee6aecd592072e0e9444dadd823427d3a71f9d4

  • SHA512

    777df03710ae59ee96d5b3af07d1ec78de48036b9e4c5af8e72044e8b72c0fef17368dac62ef8673996178e4b5bf42fff14cf8b8e8f631242b233d6005ed0b89

  • SSDEEP

    1572864:wVVQSK1CWsZrHF0JYb9U82smZ4BAQZq+PMQz:wVVVWoH6cZE4B9q+PMS

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Red Dead Redemption Save Editor.exe
    "C:\Users\Admin\AppData\Local\Temp\Red Dead Redemption Save Editor.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2200

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\RDRSE\CN.TTF

    Filesize

    163KB

    MD5

    310bbf9cfb70904f7b4d721066c31d8e

    SHA1

    2247ea3ea2f672afa0ad7d58220470015298fb33

    SHA256

    6138a18db8d4acd38457b4b84cd1e413f293ef68fe6486ccdf959227a5d42250

    SHA512

    0b2f5e1e1a8f90d0484be0212e2ceb2603b4be82cf4b9adf458e31408a2f2f26873428f40dc3fa8cd3f26d3c37c750cd38df4b0f0a061758a938d9c6a2f2bfd9

  • C:\Users\Admin\AppData\Local\RDRSE\LI.TTF

    Filesize

    753KB

    MD5

    1ba3a76c457f0f1e6b5f210300868438

    SHA1

    f07f429299f9fa15d21b7b58d692d94e1f893482

    SHA256

    c2e1ffb4ac3c0d9732fa550952fd6eefaeafd0302086778cdf2ade3b3be5b58d

    SHA512

    4cde0cdd14ea643f8f75f6570392b0e74a505b0d98c658450dbd1fbd7df39148624d25e55aad4fd325a4887adae71c32da791896b69c79458806eef862dd18e4

  • C:\Users\Admin\AppData\Local\RDRSE\T\4EBF28990FF60321DE190520

    Filesize

    1B

    MD5

    93b885adfe0da089cdf634904fd59f71

    SHA1

    5ba93c9db0cff93f52b521d7420e43f6eda2784f

    SHA256

    6e340b9cffb37a989ca544e6bb780a2c78901d3fb33738768511a30617afa01d

    SHA512

    b8244d028981d693af7b456af8efa4cad63d282e19ff14942c246e50d9351d22704a802a71c3580b6370de4ceb293c324a8423342557d4e5c38438f0e36910ee

  • memory/2200-14-0x00000000748E0000-0x0000000074FCE000-memory.dmp

    Filesize

    6.9MB

  • memory/2200-4-0x0000000023A70000-0x0000000023FA8000-memory.dmp

    Filesize

    5.2MB

  • memory/2200-5-0x000000002A8C0000-0x000000002A8F4000-memory.dmp

    Filesize

    208KB

  • memory/2200-3-0x0000000017940000-0x0000000019FB8000-memory.dmp

    Filesize

    38.5MB

  • memory/2200-13-0x00000000748E0000-0x0000000074FCE000-memory.dmp

    Filesize

    6.9MB

  • memory/2200-0-0x00000000748EE000-0x00000000748EF000-memory.dmp

    Filesize

    4KB

  • memory/2200-2-0x00000000748E0000-0x0000000074FCE000-memory.dmp

    Filesize

    6.9MB

  • memory/2200-26-0x000000000B060000-0x000000000B06A000-memory.dmp

    Filesize

    40KB

  • memory/2200-29-0x00000000748EE000-0x00000000748EF000-memory.dmp

    Filesize

    4KB

  • memory/2200-30-0x00000000748E0000-0x0000000074FCE000-memory.dmp

    Filesize

    6.9MB

  • memory/2200-31-0x00000000748E0000-0x0000000074FCE000-memory.dmp

    Filesize

    6.9MB

  • memory/2200-32-0x00000000278C0000-0x00000000278D4000-memory.dmp

    Filesize

    80KB

  • memory/2200-1-0x00000000002D0000-0x00000000043D8000-memory.dmp

    Filesize

    65.0MB