Analysis
-
max time kernel
154s -
max time network
166s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
11-10-2021 14:17
Behavioral task
behavioral1
Sample
warface cheat.exe
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
warface cheat.exe
-
Size
49KB
-
MD5
ae0a9ba0686ad4be301eaacb06512b4e
-
SHA1
fce8b4a67fb5fe1cdfb1064f83666d18e719fae2
-
SHA256
3b019244b4ae2dbd3661304708254f8e24a3e8062019fe8a6252298ff9dbc9ab
-
SHA512
78578e75fd62476df29b43389a93f049ebe94ecafee52d3550ee6d4db598b063268c418360c573315af873fbbb6d4d553ce7ff4f3e8a6652cc6222ffdb1dd181
Score
8/10
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs
-
Drops startup file 2 IoCs
Processes:
warface cheat.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a998e41a31430f2651e98879fc88b49e.exe warface cheat.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a998e41a31430f2651e98879fc88b49e.exe warface cheat.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
warface cheat.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\a998e41a31430f2651e98879fc88b49e = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\warface cheat.exe\" .." warface cheat.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\a998e41a31430f2651e98879fc88b49e = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\warface cheat.exe\" .." warface cheat.exe -
Drops autorun.inf file 1 TTPs
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 4372 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exewarface cheat.exepid process 3436 powershell.exe 3436 powershell.exe 3436 powershell.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe 4916 warface cheat.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
warface cheat.exepid process 4916 warface cheat.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
Processes:
powershell.exewarface cheat.exetaskkill.exedescription pid process Token: SeDebugPrivilege 3436 powershell.exe Token: SeDebugPrivilege 4916 warface cheat.exe Token: SeDebugPrivilege 4372 taskkill.exe Token: 33 4916 warface cheat.exe Token: SeIncBasePriorityPrivilege 4916 warface cheat.exe Token: 33 4916 warface cheat.exe Token: SeIncBasePriorityPrivilege 4916 warface cheat.exe Token: 33 4916 warface cheat.exe Token: SeIncBasePriorityPrivilege 4916 warface cheat.exe Token: 33 4916 warface cheat.exe Token: SeIncBasePriorityPrivilege 4916 warface cheat.exe Token: 33 4916 warface cheat.exe Token: SeIncBasePriorityPrivilege 4916 warface cheat.exe Token: 33 4916 warface cheat.exe Token: SeIncBasePriorityPrivilege 4916 warface cheat.exe Token: 33 4916 warface cheat.exe Token: SeIncBasePriorityPrivilege 4916 warface cheat.exe Token: 33 4916 warface cheat.exe Token: SeIncBasePriorityPrivilege 4916 warface cheat.exe Token: 33 4916 warface cheat.exe Token: SeIncBasePriorityPrivilege 4916 warface cheat.exe Token: 33 4916 warface cheat.exe Token: SeIncBasePriorityPrivilege 4916 warface cheat.exe Token: 33 4916 warface cheat.exe Token: SeIncBasePriorityPrivilege 4916 warface cheat.exe Token: 33 4916 warface cheat.exe Token: SeIncBasePriorityPrivilege 4916 warface cheat.exe Token: 33 4916 warface cheat.exe Token: SeIncBasePriorityPrivilege 4916 warface cheat.exe Token: 33 4916 warface cheat.exe Token: SeIncBasePriorityPrivilege 4916 warface cheat.exe Token: 33 4916 warface cheat.exe Token: SeIncBasePriorityPrivilege 4916 warface cheat.exe Token: 33 4916 warface cheat.exe Token: SeIncBasePriorityPrivilege 4916 warface cheat.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
warface cheat.exedescription pid process target process PID 4916 wrote to memory of 3472 4916 warface cheat.exe netsh.exe PID 4916 wrote to memory of 3472 4916 warface cheat.exe netsh.exe PID 4916 wrote to memory of 3472 4916 warface cheat.exe netsh.exe PID 4916 wrote to memory of 4372 4916 warface cheat.exe taskkill.exe PID 4916 wrote to memory of 4372 4916 warface cheat.exe taskkill.exe PID 4916 wrote to memory of 4372 4916 warface cheat.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\warface cheat.exe"C:\Users\Admin\AppData\Local\Temp\warface cheat.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\warface cheat.exe" "warface cheat.exe" ENABLE2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM Exsample.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3436-121-0x000001C819630000-0x000001C819632000-memory.dmpFilesize
8KB
-
memory/3436-140-0x000001C833ED0000-0x000001C833ED1000-memory.dmpFilesize
4KB
-
memory/3436-115-0x000001C819630000-0x000001C819632000-memory.dmpFilesize
8KB
-
memory/3436-117-0x000001C819630000-0x000001C819632000-memory.dmpFilesize
8KB
-
memory/3436-118-0x000001C819630000-0x000001C819632000-memory.dmpFilesize
8KB
-
memory/3436-119-0x000001C833A30000-0x000001C833A31000-memory.dmpFilesize
4KB
-
memory/3436-120-0x000001C831A50000-0x000001C831A52000-memory.dmpFilesize
8KB
-
memory/3436-122-0x000001C831A53000-0x000001C831A55000-memory.dmpFilesize
8KB
-
memory/3436-116-0x000001C819630000-0x000001C819632000-memory.dmpFilesize
8KB
-
memory/3436-123-0x000001C819630000-0x000001C819632000-memory.dmpFilesize
8KB
-
memory/3436-124-0x000001C819630000-0x000001C819632000-memory.dmpFilesize
8KB
-
memory/3436-125-0x000001C819630000-0x000001C819632000-memory.dmpFilesize
8KB
-
memory/3436-126-0x000001C819630000-0x000001C819632000-memory.dmpFilesize
8KB
-
memory/3436-114-0x000001C819630000-0x000001C819632000-memory.dmpFilesize
8KB
-
memory/3436-151-0x000001C8340F0000-0x000001C8340F1000-memory.dmpFilesize
4KB
-
memory/3436-156-0x000001C819630000-0x000001C819632000-memory.dmpFilesize
8KB
-
memory/3472-158-0x0000000000000000-mapping.dmp
-
memory/4372-159-0x0000000000000000-mapping.dmp
-
memory/4916-157-0x0000000002610000-0x0000000002611000-memory.dmpFilesize
4KB