Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 01:40
Static task
static1
Behavioral task
behavioral1
Sample
CheatEngine74.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
CheatEngine74.exe
Resource
win10v2004-20220812-en
General
-
Target
CheatEngine74.exe
-
Size
3.2MB
-
MD5
deecf6becb2029c1af341d7f9a4981c2
-
SHA1
1a7cc91492b5825a742a6bd9e8e8d4a9d20f41f9
-
SHA256
665d81db8595d972d9fe33dbafcb0b37c0874dff0a5b5091a311a3599e690b32
-
SHA512
60d9907e28382d76da9665c68a8fb12948aa9441bf6b32599287b20c3c6399c886a8666f131723e66bd0656b85b7d238c9cbe17f55123fb2297cf3048f2f06b6
-
SSDEEP
98304:7Si64opH4opH4opuE9vBuifd1EdKKBEXJhJb:mDBDBDlZOKKB2p
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1920 CheatEngine74.tmp -
Loads dropped DLL 3 IoCs
pid Process 1920 CheatEngine74.tmp 1920 CheatEngine74.tmp 1920 CheatEngine74.tmp -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 CheatEngine74.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ CheatEngine74.tmp -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 24 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1920 CheatEngine74.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4664 wrote to memory of 1920 4664 CheatEngine74.exe 81 PID 4664 wrote to memory of 1920 4664 CheatEngine74.exe 81 PID 4664 wrote to memory of 1920 4664 CheatEngine74.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\CheatEngine74.exe"C:\Users\Admin\AppData\Local\Temp\CheatEngine74.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\is-IFIUQ.tmp\CheatEngine74.tmp"C:\Users\Admin\AppData\Local\Temp\is-IFIUQ.tmp\CheatEngine74.tmp" /SL5="$801C4,2408085,845312,C:\Users\Admin\AppData\Local\Temp\CheatEngine74.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:1920
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD59858749c3a44de91503ba1124f98a4f0
SHA19e871a2a692fe7fa03cbd2b958a48eee9a694758
SHA256058a000842e85dbf501d6fc76fa4a73e13b31102367d06d459c8ba8e7e91a201
SHA51285c8f861cca5adee81d8707627ca008821993c19be35ed86372bd50457ed194d11138e9e34e3e527ef4253857eac372eedd0d7a511ae11927be36eefe39c5dc4
-
Filesize
37KB
MD567965a5957a61867d661f05ae1f4773e
SHA1f14c0a4f154dc685bb7c65b2d804a02a0fb2360d
SHA256450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105
SHA512c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b
-
Filesize
37KB
MD567965a5957a61867d661f05ae1f4773e
SHA1f14c0a4f154dc685bb7c65b2d804a02a0fb2360d
SHA256450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105
SHA512c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b
-
Filesize
2.0MB
MD5e1f18a22199c6f6aa5d87b24e5b39ef1
SHA10dcd8f90b575f6f1d10d6789fe769fa26daafd0e
SHA25662c56c8cf2ac6521ce047b73aa99b6d3952ca53f11d34b00e98d17674a2fc10d
SHA5125a10a2f096adce6e7db3a40bc3ea3fd44d602966e606706ee5a780703f211de7f77656c79c296390baee1e008dc3ce327eaaf5d78bbae20108670c5bc809a190