Edit tour
Windows
Analysis Report
Palworld.exe
Overview
General Information
Detection
Score: | 48 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Sigma detected: Suspicious Process Patterns NTDS.DIT Exfil
Writes many files with high entropy
Checks for available system drives (often done to infect USB drives)
Connects to many different domains
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Drops files with a non-matching file extension (content does not match file extension)
Found dropped PE file which has not been started or loaded
Found evaded block containing many API calls
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found evasive API chain checking for process token information
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
PE file contains strange resources
PE file does not import any functions
PE file overlay found
Sample file is different than original file name gathered from version info
Sigma detected: Wow6432Node CurrentVersion Autorun Keys Modification
Stores files to the Windows start menu directory
Tries to load missing DLLs
Uses code obfuscation techniques (call, push, ret)
Classification
- System is w10x64_ra
- Palworld.exe (PID: 3284 cmdline:
C:\Users\u ser\Deskto p\Palworld .exe MD5: A9181A14270AD54407A16516C05817BE)
- chrome.exe (PID: 2364 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA) - chrome.exe (PID: 6508 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2188 --fi eld-trial- handle=211 6,i,884195 8676898613 242,115072 3883391921 7486,26214 4 /prefetc h:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA) - chrome.exe (PID: 5356 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= chrome.moj om.UtilRea dIcon --la ng=en-US - -service-s andbox-typ e=icon_rea der --mojo -platform- channel-ha ndle=6212 --field-tr ial-handle =2116,i,88 4195867689 8613242,11 5072388339 19217486,2 62144 /pre fetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA) - dxwebsetup.exe (PID: 3760 cmdline:
"C:\Users\ user\Downl oads\dxweb setup.exe" MD5: 2CBD6AD183914A0C554F0739069E77D7) - dxwebsetup.exe (PID: 3160 cmdline:
"C:\Users\ user\Downl oads\dxweb setup.exe" MD5: 2CBD6AD183914A0C554F0739069E77D7) - dxwsetup.exe (PID: 5416 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\IXP000. TMP\dxwset up.exe MD5: AC3A5F7BE8CD13A863B50AB5FE00B71C)
- Palworld.exe (PID: 2688 cmdline:
"C:\Users\ user\Deskt op\Palworl d.exe" MD5: A9181A14270AD54407A16516C05817BE)
- cleanup
⊘No configs have been found
⊘No yara matches
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
⊘No Snort rule has matched
Click to jump to signature section
Show All Signature Results
Source: | Window detected: |