Edit tour
Windows
Analysis Report
Palworld.zip
Overview
General Information
Detection
Score: | 48 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Sigma detected: Suspicious Process Patterns NTDS.DIT Exfil
Writes many files with high entropy
Checks for available system drives (often done to infect USB drives)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found dropped PE file which has not been started or loaded
Found evaded block containing many API calls
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found evasive API chain checking for process token information
Found potential string decryption / allocating functions
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains executable resources (Code or Archives)
PE file contains strange resources
Sigma detected: Wow6432Node CurrentVersion Autorun Keys Modification
Tries to load missing DLLs
Uses code obfuscation techniques (call, push, ret)
Classification
- System is w10x64_ra
- rundll32.exe (PID: 6132 cmdline:
C:\Windows \System32\ rundll32.e xe C:\Wind ows\System 32\shell32 .dll,SHCre ateLocalSe rverRunDll {9aa46009 -3ce0-458a -a354-7156 10a075e6} -Embedding MD5: EF3179D498793BF4234F708D3BE28633)
- dxwebsetup.exe (PID: 2268 cmdline:
"C:\Users\ user\Deskt op\Palworl d\dxwebset up.exe" MD5: 2CBD6AD183914A0C554F0739069E77D7)
- dxwebsetup.exe (PID: 2220 cmdline:
"C:\Users\ user\Deskt op\Palworl d\dxwebset up.exe" MD5: 2CBD6AD183914A0C554F0739069E77D7) - dxwsetup.exe (PID: 6588 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\IXP000. TMP\dxwset up.exe MD5: AC3A5F7BE8CD13A863B50AB5FE00B71C)
- Palworld.exe (PID: 5880 cmdline:
"C:\Users\ user\Deskt op\Palworl d\Palworld .exe" MD5: A9181A14270AD54407A16516C05817BE)
- cleanup
⊘No configs have been found
⊘No yara matches
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
⊘No Snort rule has matched
Click to jump to signature section
Show All Signature Results
Source: | Window detected: |