Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/06/2024, 08:09

General

  • Target

    TeknoMW3_Client_Launcher.exe

  • Size

    2.0MB

  • MD5

    453b4a63252613dc5d090403c96e6075

  • SHA1

    219c6121731b90e53f01fef7dd6fdb3fc0902356

  • SHA256

    5d80574ffbb22dea3ef37e53f6ac4d33009a2a05b36974e74fb1868f2c4e8b11

  • SHA512

    5aaeaa18f47cc9da0a4fb47d6808f239a10a45aac944dc94800298c23f8ea09e63d7ef89a2d0f734663ab1316866c77340b8a2fe6312c7239e989f2990f1ea47

  • SSDEEP

    49152:dRPQ+meBXBOBgBc4WKYNfGR8mB+CSA/Bkj0WE:/xJoGmRLNfGR8mzSAo

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TeknoMW3_Client_Launcher.exe
    "C:\Users\Admin\AppData\Local\Temp\TeknoMW3_Client_Launcher.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1620

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1620-0-0x00007FF8CE9A3000-0x00007FF8CE9A5000-memory.dmp

    Filesize

    8KB

  • memory/1620-1-0x00000212E7910000-0x00000212E7B1E000-memory.dmp

    Filesize

    2.1MB

  • memory/1620-2-0x00007FF8CE9A0000-0x00007FF8CF461000-memory.dmp

    Filesize

    10.8MB

  • memory/1620-3-0x00000212EC4E0000-0x00000212EC592000-memory.dmp

    Filesize

    712KB

  • memory/1620-4-0x00007FF8CE9A0000-0x00007FF8CF461000-memory.dmp

    Filesize

    10.8MB

  • memory/1620-5-0x00007FF8CE9A3000-0x00007FF8CE9A5000-memory.dmp

    Filesize

    8KB

  • memory/1620-6-0x00007FF8CE9A0000-0x00007FF8CF461000-memory.dmp

    Filesize

    10.8MB

  • memory/1620-7-0x00007FF8CE9A0000-0x00007FF8CF461000-memory.dmp

    Filesize

    10.8MB