Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 23:26

General

  • Target

    PlayFab.exe

  • Size

    11.0MB

  • MD5

    6eaaaab2bbaeee4395ca15706b63cd25

  • SHA1

    591b61a938912f830a3198e7ab1a2b12275823cb

  • SHA256

    265e1d27ee6dc9150451652b0298e78a37db6ab57a96a2d3b4317c5f43ecbbcc

  • SHA512

    10be918ba76b3bc2b517935fe24d332f2c3f4532698cd8e011aa872f46ce187de8e1bef50f51914e69deb902ed703728add60284be32f865c90b5bb987f4f26b

  • SSDEEP

    196608:dnc/X1G89EqlA1HeT39Iigw8v+vvKub75bcjWgbkzfAcUToWmCbBPkjbzWl+OUda:wG8du1+TtIiFpvvB5IjWqkzem3pHda

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PlayFab.exe
    "C:\Users\Admin\AppData\Local\Temp\PlayFab.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2400
    • C:\Users\Admin\AppData\Local\Temp\PlayFab.exe
      "C:\Users\Admin\AppData\Local\Temp\PlayFab.exe"
      2⤵
      • Loads dropped DLL
      PID:1668

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\_MEI24002\python312.dll

          Filesize

          6.7MB

          MD5

          550288a078dffc3430c08da888e70810

          SHA1

          01b1d31f37fb3fd81d893cc5e4a258e976f5884f

          SHA256

          789a42ac160cef98f8925cb347473eeeb4e70f5513242e7faba5139ba06edf2d

          SHA512

          7244432fc3716f7ef27630d4e8fbc8180a2542aa97a01d44dca260ab43966dd8ac98b6023400b0478a4809aace1a128f1f4d6e544f2e591a5b436fd4c8a9d723