Analysis
-
max time kernel
149s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2024, 12:41
Static task
static1
Behavioral task
behavioral1
Sample
Crysis2_v1.9.Tr8/cs2v1.9trn.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
Crysis2_v1.9.Tr8/cs2v1.9trn.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Crysis2_v1.9.Tr8/游民星空 Gamersky.com.url
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
Crysis2_v1.9.Tr8/游民星空 Gamersky.com.url
Resource
win10v2004-20240508-en
General
-
Target
Crysis2_v1.9.Tr8/cs2v1.9trn.exe
-
Size
3.3MB
-
MD5
491ffa8c202524df5f1f3f20e8812248
-
SHA1
f7c144fd051b565b21910293f80c3246b648b561
-
SHA256
2eb5bcc87e6d83f6254279d4342a5ba854305862c2da928e99ec14ab2fdc1d3d
-
SHA512
ec34e8bb21780e1c3a684a94f4142ee12b611c9b208fa0cb804b8b01ab8d42fee1b570d940114c6ebbe29bb59f7f6e4d0b9ef831527b5841ea1cec42ef2ded0a
-
SSDEEP
49152:TWYqyLGzowuKQsD95ftdSBKqGyYjFDjudpfnQszk0X7eZaz9UzabDXiDLTeL9H1c:a/t+s55HoEDCnnxX7Vz9pDXuHeFqHRC
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3064 cs2v1.9trn.exe 1592 cs2v1.9trn.exe -
Loads dropped DLL 2 IoCs
pid Process 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe 1592 cs2v1.9trn.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 1592 cs2v1.9trn.exe Token: SeLoadDriverPrivilege 1592 cs2v1.9trn.exe Token: SeCreateGlobalPrivilege 1592 cs2v1.9trn.exe Token: 33 1592 cs2v1.9trn.exe Token: SeSecurityPrivilege 1592 cs2v1.9trn.exe Token: SeTakeOwnershipPrivilege 1592 cs2v1.9trn.exe Token: SeManageVolumePrivilege 1592 cs2v1.9trn.exe Token: SeBackupPrivilege 1592 cs2v1.9trn.exe Token: SeCreatePagefilePrivilege 1592 cs2v1.9trn.exe Token: SeShutdownPrivilege 1592 cs2v1.9trn.exe Token: SeRestorePrivilege 1592 cs2v1.9trn.exe Token: 33 1592 cs2v1.9trn.exe Token: SeIncBasePriorityPrivilege 1592 cs2v1.9trn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1592 cs2v1.9trn.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3632 wrote to memory of 3064 3632 cs2v1.9trn.exe 82 PID 3632 wrote to memory of 3064 3632 cs2v1.9trn.exe 82 PID 3632 wrote to memory of 3064 3632 cs2v1.9trn.exe 82 PID 3064 wrote to memory of 1592 3064 cs2v1.9trn.exe 85 PID 3064 wrote to memory of 1592 3064 cs2v1.9trn.exe 85 PID 3064 wrote to memory of 1592 3064 cs2v1.9trn.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\Crysis2_v1.9.Tr8\cs2v1.9trn.exe"C:\Users\Admin\AppData\Local\Temp\Crysis2_v1.9.Tr8\cs2v1.9trn.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\cetrainers\CET6002.tmp\cs2v1.9trn.exe"C:\Users\Admin\AppData\Local\Temp\cetrainers\CET6002.tmp\cs2v1.9trn.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\cetrainers\CET6002.tmp\extracted\cs2v1.9trn.exeC:\Users\Admin\AppData\Local\Temp\cetrainers\CET6002.tmp\extracted\cs2v1.9trn.exe "C:\Users\Admin\AppData\Local\Temp\cetrainers\CET6002.tmp\extracted\CET_TRAINER.CETRAINER"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1592
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5795b93629205df600ec3212895e4d372
SHA168d39ba24bb5a9ad71ca93aea75374c5503fd2a7
SHA256f054f1aa465f817a203079a35fc09ca2acff20f457fa5120cc5612bc4e458f26
SHA512b6d04a3b515f4ab368dd63c8abf607db336369ee95f0c31b6f7f32fbe9c45c747f54d6c4bb4d3bb7c106b614612c0125ab129fc634337258507d798c9b3e9bdc
-
Filesize
183KB
MD57037a98950fa4011691b8121da1a20e1
SHA18dbb0dc51efc5afb6839a647d9b38f56b9310528
SHA25649f55634873319d06dd9a32f2c0b63ebd6cbdffdbcbad7162b7c31f50d3c7da1
SHA51260a4ac59b8ce840dfa37dcac4785a18b76a55fd7dd55aa6bef4cd503a33959c74941da98211e27e082e533e47eeb176fc99bed91b4827bec904135a372d9128a
-
Filesize
200KB
MD54e2b82bebaa4d3df18bf174115c70aa0
SHA18e7dc54fff2dd20dbfb98c96d03e95a0cd068b55
SHA25682c641a34b9db676253f971194ea6d420263f8689ae475e20487de3db65cb5bd
SHA512f15f6956ea87e418c8ef808d49ffa04fbf59f5763d2e9b3c00fc74cad277501c2cb4d093b7ec071881484591408084b316f7ab1149b01fa1c7ad63ec0893380c
-
Filesize
6.0MB
MD5ab9983b19ae94f47cc870e1914955370
SHA142641e6015220db5095b28606c82c003e2db097b
SHA256ce481709c585d0efeebabce7da99ed338d0faa80556eac6fd150fd44ed1f0b48
SHA512eb60a4249a765d3972d60ec237098a6cf81dc554bed9950728423b2c69a01c3ae1df36df7db8dede4b5d88dee02c5f9a9eac460bf5893f052418de5fff48e5fb
-
Filesize
3KB
MD531065eca47aa65a75033dddd13e90755
SHA1d4ee2db8aeb1b05060b0e9f130a27f6ccf16f18b
SHA256317025f2cb7f93ffefb5c87fecf445e4fcaadfbd00ee9ac3e65b803c2b980534
SHA51299045cb9f1475da98559b56d8bdae2414ead3544f419d4c3fe40c5e5b9679f48a870077fa0a54a3ea8e5d511842a868f088cbd35a44b72a2687897fdd683ec92
-
Filesize
321KB
MD5859be12ad1e4ace1418ff3a069b35115
SHA188ac1d322b610c8e57d7e0b275dfe525d7525e59
SHA2569a99ea10acd1378ccc4f23a91b00b9969d640419779b17711b21f2100d2db48c
SHA5122ec4615473843e5e723b09fdda510ce3d4cc64e46c92340561d4a09a975cc8d9d1162ca3d3f952c939b38557e5014fffd9976dfec3a7239472056d51136d7347
-
Filesize
1.2MB
MD54003e34416ebd25e4c115d49dc15e1a7
SHA1faf95ec65cde5bd833ce610bb8523363310ec4ad
SHA256c06430b8cb025be506be50a756488e1bcc3827c4f45158d93e4e3eeb98ce1e4f
SHA51288f5d417377cd62bde417640a79b6ac493e80f0c8b1f63a99378a2a67695ef8e4a541cedb91acfa296ed608e821fee466983806f0d082ed2e74b0cd93eb4fb84