Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    17-07-2024 17:12

General

  • Target

    Sekiro Shadows Die Twice v1.02-v1.05 Plus 24 Trainer.exe

  • Size

    1.3MB

  • MD5

    3ab8e83e8684f2bf86a7678680d8a642

  • SHA1

    a93cde2b583fa2fa1ff0d9d3795f66a040bdbfa9

  • SHA256

    d13f31170d42f41729420a71a17d1dc4800ed791d9643efc1f676c4cf021adb2

  • SHA512

    2cd60346e9eb29cb3a898eaaf144f2ab104b04fb7c45ea38338a70f2293f999009c4d3f66fc9f7dee33fdf19046b12c9b80b246918f5cb58163f8e5d6bafd3d9

  • SSDEEP

    24576:NXFKALnj8qofaiUhK9OLaUDwihwpWn3SILR36lSbbJ7QDSoW/y:bvjoCiuYOTDVdn3dYOV7n

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Sekiro Shadows Die Twice v1.02-v1.05 Plus 24 Trainer.exe
    "C:\Users\Admin\AppData\Local\Temp\Sekiro Shadows Die Twice v1.02-v1.05 Plus 24 Trainer.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2852
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2852 -s 764
      2⤵
        PID:2828

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2852-0-0x000007FEF6193000-0x000007FEF6194000-memory.dmp

      Filesize

      4KB

    • memory/2852-1-0x0000000000440000-0x0000000000472000-memory.dmp

      Filesize

      200KB

    • memory/2852-2-0x000007FEF6190000-0x000007FEF6B7C000-memory.dmp

      Filesize

      9.9MB

    • memory/2852-3-0x000007FEF6190000-0x000007FEF6B7C000-memory.dmp

      Filesize

      9.9MB

    • memory/2852-4-0x000007FEF6190000-0x000007FEF6B7C000-memory.dmp

      Filesize

      9.9MB

    • memory/2852-7-0x000007FEF6190000-0x000007FEF6B7C000-memory.dmp

      Filesize

      9.9MB

    • memory/2852-9-0x000007FEF6190000-0x000007FEF6B7C000-memory.dmp

      Filesize

      9.9MB

    • memory/2852-10-0x000007FEF6193000-0x000007FEF6194000-memory.dmp

      Filesize

      4KB

    • memory/2852-11-0x000007FEF6190000-0x000007FEF6B7C000-memory.dmp

      Filesize

      9.9MB