Analysis
-
max time kernel
33s -
max time network
34s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
30/03/2025, 20:58
Behavioral task
behavioral1
Sample
Sylora.Game.InjectorClient.zip
Resource
win10ltsc2021-20250314-en
5 signatures
900 seconds
General
-
Target
Sylora.Game.InjectorClient.zip
-
Size
15.5MB
-
MD5
2cdfa50f904a6346b89cd31be9d42525
-
SHA1
6b53a25b80810caaefef89400253658f8a1ea6ca
-
SHA256
7f9a5f0f123cca16418fb9c1742dc8ed085f70bc8d3027e13fb74ffe07dd9ed3
-
SHA512
e89ee29eb2d59c7ce1ee36dbce1de87d47fd298a3f29ceed8b9773366986e0b8ff72e588db06cedff205d0e3c6a5788525c0e187e2e0f46af2a020dea54ed129
-
SSDEEP
393216:yr1svzD1IdTLJywF3I57VUyJDzOFW8mNwR2sLa5mC:yr1svf1IdTtyEy7VnQ8NwhON
Score
1/10
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4780 taskmgr.exe Token: SeSystemProfilePrivilege 4780 taskmgr.exe Token: SeCreateGlobalPrivilege 4780 taskmgr.exe Token: 33 4780 taskmgr.exe Token: SeIncBasePriorityPrivilege 4780 taskmgr.exe -
Suspicious use of FindShellTrayWindow 31 IoCs
pid Process 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe 4780 taskmgr.exe
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Sylora.Game.InjectorClient.zip1⤵PID:5192
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4780