Analysis
-
max time kernel
154s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220722-en -
resource tags
arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system -
submitted
11-08-2022 16:03
Static task
static1
Behavioral task
behavioral1
Sample
GrandTheftAutoVcheat.exe
Resource
win7-20220718-en
General
-
Target
GrandTheftAutoVcheat.exe
-
Size
421KB
-
MD5
58fc3bb157e30334818c6f8a184ed14a
-
SHA1
e89d26ebdd8585840094db45d60968455bcfd822
-
SHA256
0c30a372c59133044f5e0c6c7a4779515f64b2a3f03c0ee66549c3216873a1dd
-
SHA512
91a4cfe6cbab2db859eec1c0e24da16c77d88d17d9355ada82ab4728cd7b522387c864a6c379313f75f1334d4e78322cc7808d25703f3c72bcc74e56438ad895
Malware Config
Extracted
colibri
1.2.0
Build1
http://zpltcmgodhvvedxtfcygvbgjkvgvcguygytfigj.cc/gate.php
http://yugyuvyugguitgyuigtfyutdtoghghbbgyv.cx/gate.php
Signatures
-
Executes dropped EXE 9 IoCs
Processes:
tmp99FE.tmp.exetmp99FE.tmp.exetmp99FE.tmp.exeGet-Variable.exeGet-Variable.exeGet-Variable.exeGet-Variable.exeGet-Variable.exeGet-Variable.exepid process 2220 tmp99FE.tmp.exe 1776 tmp99FE.tmp.exe 1604 tmp99FE.tmp.exe 2804 Get-Variable.exe 4056 Get-Variable.exe 3540 Get-Variable.exe 2312 Get-Variable.exe 4920 Get-Variable.exe 3968 Get-Variable.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
GrandTheftAutoVcheat.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\Control Panel\International\Geo\Nation GrandTheftAutoVcheat.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
tmp99FE.tmp.exeGet-Variable.exedescription pid process target process PID 1776 set thread context of 1604 1776 tmp99FE.tmp.exe tmp99FE.tmp.exe PID 4056 set thread context of 3540 4056 Get-Variable.exe Get-Variable.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
GrandTheftAutoVcheat.exepid process 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe 4908 GrandTheftAutoVcheat.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
GrandTheftAutoVcheat.exepowershell.exedescription pid process Token: SeDebugPrivilege 4908 GrandTheftAutoVcheat.exe Token: SeDebugPrivilege 4588 powershell.exe -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
GrandTheftAutoVcheat.exetmp99FE.tmp.exetmp99FE.tmp.exetmp99FE.tmp.exeGet-Variable.exeGet-Variable.exepowershell.exeGet-Variable.exedescription pid process target process PID 4908 wrote to memory of 2220 4908 GrandTheftAutoVcheat.exe tmp99FE.tmp.exe PID 4908 wrote to memory of 2220 4908 GrandTheftAutoVcheat.exe tmp99FE.tmp.exe PID 4908 wrote to memory of 2220 4908 GrandTheftAutoVcheat.exe tmp99FE.tmp.exe PID 2220 wrote to memory of 1776 2220 tmp99FE.tmp.exe tmp99FE.tmp.exe PID 2220 wrote to memory of 1776 2220 tmp99FE.tmp.exe tmp99FE.tmp.exe PID 2220 wrote to memory of 1776 2220 tmp99FE.tmp.exe tmp99FE.tmp.exe PID 1776 wrote to memory of 1604 1776 tmp99FE.tmp.exe tmp99FE.tmp.exe PID 1776 wrote to memory of 1604 1776 tmp99FE.tmp.exe tmp99FE.tmp.exe PID 1776 wrote to memory of 1604 1776 tmp99FE.tmp.exe tmp99FE.tmp.exe PID 1776 wrote to memory of 1604 1776 tmp99FE.tmp.exe tmp99FE.tmp.exe PID 1776 wrote to memory of 1604 1776 tmp99FE.tmp.exe tmp99FE.tmp.exe PID 1776 wrote to memory of 1604 1776 tmp99FE.tmp.exe tmp99FE.tmp.exe PID 1776 wrote to memory of 1604 1776 tmp99FE.tmp.exe tmp99FE.tmp.exe PID 1604 wrote to memory of 3616 1604 tmp99FE.tmp.exe schtasks.exe PID 1604 wrote to memory of 3616 1604 tmp99FE.tmp.exe schtasks.exe PID 1604 wrote to memory of 3616 1604 tmp99FE.tmp.exe schtasks.exe PID 1604 wrote to memory of 2804 1604 tmp99FE.tmp.exe Get-Variable.exe PID 1604 wrote to memory of 2804 1604 tmp99FE.tmp.exe Get-Variable.exe PID 1604 wrote to memory of 2804 1604 tmp99FE.tmp.exe Get-Variable.exe PID 2804 wrote to memory of 4056 2804 Get-Variable.exe Get-Variable.exe PID 2804 wrote to memory of 4056 2804 Get-Variable.exe Get-Variable.exe PID 2804 wrote to memory of 4056 2804 Get-Variable.exe Get-Variable.exe PID 4056 wrote to memory of 3540 4056 Get-Variable.exe Get-Variable.exe PID 4056 wrote to memory of 3540 4056 Get-Variable.exe Get-Variable.exe PID 4056 wrote to memory of 3540 4056 Get-Variable.exe Get-Variable.exe PID 4056 wrote to memory of 3540 4056 Get-Variable.exe Get-Variable.exe PID 4056 wrote to memory of 3540 4056 Get-Variable.exe Get-Variable.exe PID 4056 wrote to memory of 3540 4056 Get-Variable.exe Get-Variable.exe PID 4056 wrote to memory of 3540 4056 Get-Variable.exe Get-Variable.exe PID 4588 wrote to memory of 2312 4588 powershell.exe Get-Variable.exe PID 4588 wrote to memory of 2312 4588 powershell.exe Get-Variable.exe PID 4588 wrote to memory of 2312 4588 powershell.exe Get-Variable.exe PID 2312 wrote to memory of 4920 2312 Get-Variable.exe Get-Variable.exe PID 2312 wrote to memory of 4920 2312 Get-Variable.exe Get-Variable.exe PID 2312 wrote to memory of 4920 2312 Get-Variable.exe Get-Variable.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\GrandTheftAutoVcheat.exe"C:\Users\Admin\AppData\Local\Temp\GrandTheftAutoVcheat.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\tmp99FE.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp99FE.tmp.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\tmp99FE.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp99FE.tmp.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\tmp99FE.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp99FE.tmp.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe/create /tn COMSurrogate /st 00:00 /du 9999:59 /sc once /ri 1 /f /tr "powershell.exe -windowstyle hidden"5⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Microsoft\WindowsApps\Get-Variable.exe"C:\Users\Admin\AppData\Local\Microsoft\WindowsApps\Get-Variable.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Microsoft\WindowsApps\Get-Variable.exe"C:\Users\Admin\AppData\Local\Microsoft\WindowsApps\Get-Variable.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Microsoft\WindowsApps\Get-Variable.exe"C:\Users\Admin\AppData\Local\Microsoft\WindowsApps\Get-Variable.exe"7⤵
- Executes dropped EXE
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Microsoft\WindowsApps\Get-Variable.exe"C:\Users\Admin\AppData\Local\Microsoft\WindowsApps\Get-Variable.exe" Name host ValueOnly True2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Microsoft\WindowsApps\Get-Variable.exe"C:\Users\Admin\AppData\Local\Microsoft\WindowsApps\Get-Variable.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Microsoft\WindowsApps\Get-Variable.exe"C:\Users\Admin\AppData\Local\Microsoft\WindowsApps\Get-Variable.exe"4⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\WindowsApps\Get-Variable.exeFilesize
52KB
MD5d8e1495b46cded57eb1423b8bb789834
SHA1db64bc20550e51c602dbb92d07c8f02842efebcc
SHA256aa2d97b5be06be67ec04774ad681da6113ee2b4929c0539929bbac19926682c8
SHA5128b785d7f8d5fdf12dd9a5414050d403e861fd3f9ac09bceebc57b2f178c6f145389783ed1035b5e6f9b627b3d4d978f3ad9bf8195d92e20f585ef92667e4cabb
-
C:\Users\Admin\AppData\Local\Microsoft\WindowsApps\Get-Variable.exeFilesize
52KB
MD5d8e1495b46cded57eb1423b8bb789834
SHA1db64bc20550e51c602dbb92d07c8f02842efebcc
SHA256aa2d97b5be06be67ec04774ad681da6113ee2b4929c0539929bbac19926682c8
SHA5128b785d7f8d5fdf12dd9a5414050d403e861fd3f9ac09bceebc57b2f178c6f145389783ed1035b5e6f9b627b3d4d978f3ad9bf8195d92e20f585ef92667e4cabb
-
C:\Users\Admin\AppData\Local\Microsoft\WindowsApps\Get-Variable.exeFilesize
52KB
MD5d8e1495b46cded57eb1423b8bb789834
SHA1db64bc20550e51c602dbb92d07c8f02842efebcc
SHA256aa2d97b5be06be67ec04774ad681da6113ee2b4929c0539929bbac19926682c8
SHA5128b785d7f8d5fdf12dd9a5414050d403e861fd3f9ac09bceebc57b2f178c6f145389783ed1035b5e6f9b627b3d4d978f3ad9bf8195d92e20f585ef92667e4cabb
-
C:\Users\Admin\AppData\Local\Microsoft\WindowsApps\Get-Variable.exeFilesize
52KB
MD5d8e1495b46cded57eb1423b8bb789834
SHA1db64bc20550e51c602dbb92d07c8f02842efebcc
SHA256aa2d97b5be06be67ec04774ad681da6113ee2b4929c0539929bbac19926682c8
SHA5128b785d7f8d5fdf12dd9a5414050d403e861fd3f9ac09bceebc57b2f178c6f145389783ed1035b5e6f9b627b3d4d978f3ad9bf8195d92e20f585ef92667e4cabb
-
C:\Users\Admin\AppData\Local\Microsoft\WindowsApps\Get-Variable.exeFilesize
52KB
MD5d8e1495b46cded57eb1423b8bb789834
SHA1db64bc20550e51c602dbb92d07c8f02842efebcc
SHA256aa2d97b5be06be67ec04774ad681da6113ee2b4929c0539929bbac19926682c8
SHA5128b785d7f8d5fdf12dd9a5414050d403e861fd3f9ac09bceebc57b2f178c6f145389783ed1035b5e6f9b627b3d4d978f3ad9bf8195d92e20f585ef92667e4cabb
-
C:\Users\Admin\AppData\Local\Microsoft\WindowsApps\Get-Variable.exeFilesize
52KB
MD5d8e1495b46cded57eb1423b8bb789834
SHA1db64bc20550e51c602dbb92d07c8f02842efebcc
SHA256aa2d97b5be06be67ec04774ad681da6113ee2b4929c0539929bbac19926682c8
SHA5128b785d7f8d5fdf12dd9a5414050d403e861fd3f9ac09bceebc57b2f178c6f145389783ed1035b5e6f9b627b3d4d978f3ad9bf8195d92e20f585ef92667e4cabb
-
C:\Users\Admin\AppData\Local\Microsoft\WindowsApps\Get-Variable.exeFilesize
52KB
MD5d8e1495b46cded57eb1423b8bb789834
SHA1db64bc20550e51c602dbb92d07c8f02842efebcc
SHA256aa2d97b5be06be67ec04774ad681da6113ee2b4929c0539929bbac19926682c8
SHA5128b785d7f8d5fdf12dd9a5414050d403e861fd3f9ac09bceebc57b2f178c6f145389783ed1035b5e6f9b627b3d4d978f3ad9bf8195d92e20f585ef92667e4cabb
-
C:\Users\Admin\AppData\Local\Temp\tmp99FE.tmp.exeFilesize
52KB
MD5d8e1495b46cded57eb1423b8bb789834
SHA1db64bc20550e51c602dbb92d07c8f02842efebcc
SHA256aa2d97b5be06be67ec04774ad681da6113ee2b4929c0539929bbac19926682c8
SHA5128b785d7f8d5fdf12dd9a5414050d403e861fd3f9ac09bceebc57b2f178c6f145389783ed1035b5e6f9b627b3d4d978f3ad9bf8195d92e20f585ef92667e4cabb
-
C:\Users\Admin\AppData\Local\Temp\tmp99FE.tmp.exeFilesize
52KB
MD5d8e1495b46cded57eb1423b8bb789834
SHA1db64bc20550e51c602dbb92d07c8f02842efebcc
SHA256aa2d97b5be06be67ec04774ad681da6113ee2b4929c0539929bbac19926682c8
SHA5128b785d7f8d5fdf12dd9a5414050d403e861fd3f9ac09bceebc57b2f178c6f145389783ed1035b5e6f9b627b3d4d978f3ad9bf8195d92e20f585ef92667e4cabb
-
C:\Users\Admin\AppData\Local\Temp\tmp99FE.tmp.exeFilesize
52KB
MD5d8e1495b46cded57eb1423b8bb789834
SHA1db64bc20550e51c602dbb92d07c8f02842efebcc
SHA256aa2d97b5be06be67ec04774ad681da6113ee2b4929c0539929bbac19926682c8
SHA5128b785d7f8d5fdf12dd9a5414050d403e861fd3f9ac09bceebc57b2f178c6f145389783ed1035b5e6f9b627b3d4d978f3ad9bf8195d92e20f585ef92667e4cabb
-
C:\Users\Admin\AppData\Local\Temp\tmp99FE.tmp.exeFilesize
52KB
MD5d8e1495b46cded57eb1423b8bb789834
SHA1db64bc20550e51c602dbb92d07c8f02842efebcc
SHA256aa2d97b5be06be67ec04774ad681da6113ee2b4929c0539929bbac19926682c8
SHA5128b785d7f8d5fdf12dd9a5414050d403e861fd3f9ac09bceebc57b2f178c6f145389783ed1035b5e6f9b627b3d4d978f3ad9bf8195d92e20f585ef92667e4cabb
-
memory/1604-162-0x0000000000400000-0x0000000000407000-memory.dmpFilesize
28KB
-
memory/1604-142-0x0000000000000000-mapping.dmp
-
memory/1604-143-0x0000000000400000-0x0000000000407000-memory.dmpFilesize
28KB
-
memory/1604-145-0x0000000000400000-0x0000000000407000-memory.dmpFilesize
28KB
-
memory/1604-150-0x0000000000400000-0x0000000000407000-memory.dmpFilesize
28KB
-
memory/1776-140-0x0000000000000000-mapping.dmp
-
memory/2220-137-0x0000000000000000-mapping.dmp
-
memory/2312-177-0x0000000001563000-0x0000000001569000-memory.dmpFilesize
24KB
-
memory/2312-175-0x0000000000000000-mapping.dmp
-
memory/2804-171-0x0000000000710000-0x0000000000810000-memory.dmpFilesize
1024KB
-
memory/2804-167-0x0000000000710000-0x0000000000810000-memory.dmpFilesize
1024KB
-
memory/2804-158-0x0000000000000000-mapping.dmp
-
memory/3540-170-0x0000000000400000-0x0000000000407000-memory.dmpFilesize
28KB
-
memory/3540-166-0x0000000000000000-mapping.dmp
-
memory/3616-157-0x0000000000000000-mapping.dmp
-
memory/4056-163-0x0000000000000000-mapping.dmp
-
memory/4056-165-0x0000000000A33000-0x0000000000A39000-memory.dmpFilesize
24KB
-
memory/4588-172-0x000001E9407A0000-0x000001E9407C2000-memory.dmpFilesize
136KB
-
memory/4588-181-0x00007FFCE4E40000-0x00007FFCE5901000-memory.dmpFilesize
10.8MB
-
memory/4588-174-0x000001E9421E0000-0x000001E942224000-memory.dmpFilesize
272KB
-
memory/4588-173-0x00007FFCE4E40000-0x00007FFCE5901000-memory.dmpFilesize
10.8MB
-
memory/4908-151-0x000000001DF80000-0x000000001DFF6000-memory.dmpFilesize
472KB
-
memory/4908-152-0x000000001B3E0000-0x000000001B3FE000-memory.dmpFilesize
120KB
-
memory/4908-135-0x0000000000670000-0x00000000006DE000-memory.dmpFilesize
440KB
-
memory/4908-153-0x000000001C850000-0x000000001C8A0000-memory.dmpFilesize
320KB
-
memory/4908-154-0x000000001E450000-0x000000001E612000-memory.dmpFilesize
1.8MB
-
memory/4908-155-0x000000001F360000-0x000000001F888000-memory.dmpFilesize
5.2MB
-
memory/4908-149-0x00007FFCE4D90000-0x00007FFCE5851000-memory.dmpFilesize
10.8MB
-
memory/4908-148-0x000000001D960000-0x000000001D99C000-memory.dmpFilesize
240KB
-
memory/4908-147-0x0000000002820000-0x0000000002832000-memory.dmpFilesize
72KB
-
memory/4908-146-0x000000001DA70000-0x000000001DB7A000-memory.dmpFilesize
1.0MB
-
memory/4908-136-0x00007FFCE4D90000-0x00007FFCE5851000-memory.dmpFilesize
10.8MB
-
memory/4908-156-0x00007FFCE4D90000-0x00007FFCE5851000-memory.dmpFilesize
10.8MB
-
memory/4920-178-0x0000000000000000-mapping.dmp