Analysis

  • max time kernel
    14s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02/09/2024, 15:23

General

  • Target

    VoyaNuiOnlineGame.exe

  • Size

    11.5MB

  • MD5

    3f59085cf68e47b1b09581fe98ca5842

  • SHA1

    d709bf7b5b82758221a6aeed887861940cedfe62

  • SHA256

    bbd5ffaf11969d927fb91752d858a5ee2307430ae8547e6c3b660b715502878e

  • SHA512

    b4c2ed197f5058e6cdf8c4e8bed13bc167201f00ca3c2043d302ddc8f2a909c949553cf58ec6faa618228d187405fe9f7aecdaf8d07719250243f90ccfcb05a2

  • SSDEEP

    196608:unfGV+xvm2w3jH4vKKlrTLmuJhvTfC3sGKMwH:ufg+xvm2G4vVlrfmuJlTK3sj

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VoyaNuiOnlineGame.exe
    "C:\Users\Admin\AppData\Local\Temp\VoyaNuiOnlineGame.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious use of SetWindowsHookEx
    PID:1996
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x4d0
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1996-0-0x0000000000350000-0x0000000000351000-memory.dmp

    Filesize

    4KB

  • memory/1996-12-0x0000000000370000-0x000000000037A000-memory.dmp

    Filesize

    40KB

  • memory/1996-13-0x0000000000370000-0x000000000037A000-memory.dmp

    Filesize

    40KB

  • memory/1996-11-0x0000000000370000-0x000000000037A000-memory.dmp

    Filesize

    40KB

  • memory/1996-10-0x0000000000370000-0x000000000037A000-memory.dmp

    Filesize

    40KB

  • memory/1996-9-0x0000000000370000-0x000000000037A000-memory.dmp

    Filesize

    40KB

  • memory/1996-8-0x0000000000370000-0x000000000037A000-memory.dmp

    Filesize

    40KB

  • memory/1996-14-0x0000000000350000-0x0000000000351000-memory.dmp

    Filesize

    4KB

  • memory/1996-15-0x0000000000370000-0x000000000037A000-memory.dmp

    Filesize

    40KB

  • memory/1996-16-0x0000000000370000-0x000000000037A000-memory.dmp

    Filesize

    40KB

  • memory/1996-17-0x0000000000370000-0x000000000037A000-memory.dmp

    Filesize

    40KB

  • memory/1996-18-0x0000000000370000-0x000000000037A000-memory.dmp

    Filesize

    40KB

  • memory/1996-20-0x0000000000370000-0x000000000037A000-memory.dmp

    Filesize

    40KB

  • memory/1996-19-0x0000000000370000-0x000000000037A000-memory.dmp

    Filesize

    40KB