Analysis

  • max time kernel
    139s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2024, 08:37

General

  • Target

    Ryujinx.exe

  • Size

    56.2MB

  • MD5

    d064e134f9bb8f531490e47fd03c8bb5

  • SHA1

    abe030418fe6b781c7a6ce17b8a5ee5f92383ab9

  • SHA256

    173dff8e81017f72c5b82dd45f21c3126e9251d8d84ee5e613da32b3548c6a94

  • SHA512

    fb57a19b0f586351b18e5778d0da1a0a96a80b98cec982a5db48e110c397a98df93675009d0073962bac73d83b527b0ba5b2b32c1200b02b70aee0988b3b298f

  • SSDEEP

    393216:qjaZgP8k+er5lPPzj4/LTie325Gzha7mP:ykgh+eVPzjeL2825Gzha7mP

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Ryujinx.exe
    "C:\Users\Admin\AppData\Local\Temp\Ryujinx.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2316

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Ryujinx\bis\system\save\8000000000000000\ExtraData1

    Filesize

    512B

    MD5

    3f7a1dad709552d980807d4b301191f3

    SHA1

    abd29f6cf08da438ecc87bf059103318fa6c1fdf

    SHA256

    499216dba61a6ff45f5114ed46d80ec81944d1da623ec1986ddf43190df08d9a

    SHA512

    36c26dfdad51fde52256b24cef134fb813ddc8b3578e280b9527a8d2c278a5b4664b3c1496aad1b1e1a1b2badb795308c92017b2f4091569bbba64179d6f66c1

  • memory/2316-0-0x000000014014D000-0x000000014014E000-memory.dmp

    Filesize

    4KB

  • memory/2316-29-0x000000014014D000-0x000000014014E000-memory.dmp

    Filesize

    4KB