Resubmissions

31-01-2025 08:09

250131-j2ehrazpbs 10

31-01-2025 08:07

250131-jz1yzasmal 10

Analysis

  • max time kernel
    28s
  • max time network
    6s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250128-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250128-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    31-01-2025 08:09

General

  • Target

    Monster Hunter World v20200109-v20231017 Plus 67 Trainer.exe

  • Size

    1.6MB

  • MD5

    dd40a930802911f047801c3aeb2b3956

  • SHA1

    e5d114e338c4026f16fd5f542bcdd6cd697fb511

  • SHA256

    41bb91427d8d4e2829ee18faba47a7d2bd64df6102cf64e789b3c190c97eea5c

  • SHA512

    70b8df602ff95b23643590ee921ad16b4ec000f78927e5d16f07a97c51da585c5f2befb4504fdddf63f84833abb1b4c798b2a43848150226d7ef9993fb499f2c

  • SSDEEP

    24576:r0yOdKnqj9MNrOoThmBZTsl3WaPECkDtGQjnEd7DSVXT5X1hnS:gSqj9MxOt83J/kwonPXT5X1hS

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Monster Hunter World v20200109-v20231017 Plus 67 Trainer.exe
    "C:\Users\Admin\AppData\Local\Temp\Monster Hunter World v20200109-v20231017 Plus 67 Trainer.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2200

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2200-0-0x00007FFCFF0B3000-0x00007FFCFF0B5000-memory.dmp

    Filesize

    8KB

  • memory/2200-1-0x0000019075A30000-0x0000019075A64000-memory.dmp

    Filesize

    208KB

  • memory/2200-2-0x00007FFCFF0B0000-0x00007FFCFFB72000-memory.dmp

    Filesize

    10.8MB

  • memory/2200-3-0x00007FFCFF0B0000-0x00007FFCFFB72000-memory.dmp

    Filesize

    10.8MB

  • memory/2200-4-0x00007FFCFF0B0000-0x00007FFCFFB72000-memory.dmp

    Filesize

    10.8MB

  • memory/2200-5-0x00007FFCFF0B0000-0x00007FFCFFB72000-memory.dmp

    Filesize

    10.8MB

  • memory/2200-6-0x00007FFCFF0B0000-0x00007FFCFFB72000-memory.dmp

    Filesize

    10.8MB

  • memory/2200-7-0x000001907B940000-0x000001907B948000-memory.dmp

    Filesize

    32KB

  • memory/2200-8-0x000001907B9C0000-0x000001907B9F8000-memory.dmp

    Filesize

    224KB

  • memory/2200-9-0x000001907B990000-0x000001907B99E000-memory.dmp

    Filesize

    56KB

  • memory/2200-24-0x00007FFCFF0B3000-0x00007FFCFF0B5000-memory.dmp

    Filesize

    8KB

  • memory/2200-25-0x00007FFCFF0B0000-0x00007FFCFFB72000-memory.dmp

    Filesize

    10.8MB

  • memory/2200-26-0x00007FFCFF0B0000-0x00007FFCFFB72000-memory.dmp

    Filesize

    10.8MB

  • memory/2200-27-0x00007FFCFF0B0000-0x00007FFCFFB72000-memory.dmp

    Filesize

    10.8MB

  • memory/2200-28-0x00007FFCFF0B0000-0x00007FFCFFB72000-memory.dmp

    Filesize

    10.8MB

  • memory/2200-29-0x00007FFCFF0B0000-0x00007FFCFFB72000-memory.dmp

    Filesize

    10.8MB