Analysis

  • max time kernel
    36s
  • max time network
    34s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241211-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    13-01-2025 00:08

General

  • Target

    Monster Hunter World v20200109-v20210602 Plus 67 Trainer.exe

  • Size

    1.6MB

  • MD5

    eb3295617d26a4902d2c51fc8ca4c9b7

  • SHA1

    c1cc56cac046678b5373ff473da1560b35cd4ca6

  • SHA256

    f5e0c4f0ef809417d2fcde05fcc037308a323383226169c56912ae401e996bab

  • SHA512

    f3fc1575075da3c875cb80e4d414a161d2c84be00febb7dacdfeab0f783117fd09984a95f5cf5863ccfa60069492a5e0313d183e01febb54b8b630ed3274eb66

  • SSDEEP

    24576:K9SxXI1fDRUbRa/9ghKUU6F9UK3/fsA9SPQaPECkDtGQjnEdfDSKk:crWCOhKOUKMA9qT/kwonn

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Monster Hunter World v20200109-v20210602 Plus 67 Trainer.exe
    "C:\Users\Admin\AppData\Local\Temp\Monster Hunter World v20200109-v20210602 Plus 67 Trainer.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3672

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3672-1-0x0000022026690000-0x00000220266C2000-memory.dmp

    Filesize

    200KB

  • memory/3672-0-0x00007FFF5AAB3000-0x00007FFF5AAB5000-memory.dmp

    Filesize

    8KB

  • memory/3672-2-0x00007FFF5AAB0000-0x00007FFF5B572000-memory.dmp

    Filesize

    10.8MB

  • memory/3672-3-0x00007FFF5AAB0000-0x00007FFF5B572000-memory.dmp

    Filesize

    10.8MB

  • memory/3672-4-0x00007FFF5AAB0000-0x00007FFF5B572000-memory.dmp

    Filesize

    10.8MB

  • memory/3672-7-0x00007FFF5AAB0000-0x00007FFF5B572000-memory.dmp

    Filesize

    10.8MB

  • memory/3672-8-0x00007FFF5AAB0000-0x00007FFF5B572000-memory.dmp

    Filesize

    10.8MB

  • memory/3672-10-0x00007FFF5AAB0000-0x00007FFF5B572000-memory.dmp

    Filesize

    10.8MB

  • memory/3672-11-0x00007FFF5AAB0000-0x00007FFF5B572000-memory.dmp

    Filesize

    10.8MB

  • memory/3672-18-0x00007FFF5AAB0000-0x00007FFF5B572000-memory.dmp

    Filesize

    10.8MB

  • memory/3672-19-0x00007FFF5AAB0000-0x00007FFF5B572000-memory.dmp

    Filesize

    10.8MB

  • memory/3672-20-0x00007FFF5AAB0000-0x00007FFF5B572000-memory.dmp

    Filesize

    10.8MB

  • memory/3672-21-0x00007FFF5AAB0000-0x00007FFF5B572000-memory.dmp

    Filesize

    10.8MB

  • memory/3672-22-0x00007FFF5AAB0000-0x00007FFF5B572000-memory.dmp

    Filesize

    10.8MB

  • memory/3672-23-0x00007FFF5AAB0000-0x00007FFF5B572000-memory.dmp

    Filesize

    10.8MB

  • memory/3672-24-0x00007FFF5AAB0000-0x00007FFF5B572000-memory.dmp

    Filesize

    10.8MB

  • memory/3672-25-0x00007FFF5AAB0000-0x00007FFF5B572000-memory.dmp

    Filesize

    10.8MB

  • memory/3672-26-0x00007FFF5AAB0000-0x00007FFF5B572000-memory.dmp

    Filesize

    10.8MB