Analysis

  • max time kernel
    151s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 01:40

General

  • Target

    CheatEngine74.exe

  • Size

    3.2MB

  • MD5

    deecf6becb2029c1af341d7f9a4981c2

  • SHA1

    1a7cc91492b5825a742a6bd9e8e8d4a9d20f41f9

  • SHA256

    665d81db8595d972d9fe33dbafcb0b37c0874dff0a5b5091a311a3599e690b32

  • SHA512

    60d9907e28382d76da9665c68a8fb12948aa9441bf6b32599287b20c3c6399c886a8666f131723e66bd0656b85b7d238c9cbe17f55123fb2297cf3048f2f06b6

  • SSDEEP

    98304:7Si64opH4opH4opuE9vBuifd1EdKKBEXJhJb:mDBDBDlZOKKB2p

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CheatEngine74.exe
    "C:\Users\Admin\AppData\Local\Temp\CheatEngine74.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4664
    • C:\Users\Admin\AppData\Local\Temp\is-IFIUQ.tmp\CheatEngine74.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-IFIUQ.tmp\CheatEngine74.tmp" /SL5="$801C4,2408085,845312,C:\Users\Admin\AppData\Local\Temp\CheatEngine74.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks processor information in registry
      • Suspicious use of SetWindowsHookEx
      PID:1920

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\is-IFIUQ.tmp\CheatEngine74.tmp

          Filesize

          2.9MB

          MD5

          9858749c3a44de91503ba1124f98a4f0

          SHA1

          9e871a2a692fe7fa03cbd2b958a48eee9a694758

          SHA256

          058a000842e85dbf501d6fc76fa4a73e13b31102367d06d459c8ba8e7e91a201

          SHA512

          85c8f861cca5adee81d8707627ca008821993c19be35ed86372bd50457ed194d11138e9e34e3e527ef4253857eac372eedd0d7a511ae11927be36eefe39c5dc4

        • C:\Users\Admin\AppData\Local\Temp\is-NELI5.tmp\botva2.dll

          Filesize

          37KB

          MD5

          67965a5957a61867d661f05ae1f4773e

          SHA1

          f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

          SHA256

          450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

          SHA512

          c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

        • C:\Users\Admin\AppData\Local\Temp\is-NELI5.tmp\botva2.dll

          Filesize

          37KB

          MD5

          67965a5957a61867d661f05ae1f4773e

          SHA1

          f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

          SHA256

          450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

          SHA512

          c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

        • C:\Users\Admin\AppData\Local\Temp\is-NELI5.tmp\zbShieldUtils.dll

          Filesize

          2.0MB

          MD5

          e1f18a22199c6f6aa5d87b24e5b39ef1

          SHA1

          0dcd8f90b575f6f1d10d6789fe769fa26daafd0e

          SHA256

          62c56c8cf2ac6521ce047b73aa99b6d3952ca53f11d34b00e98d17674a2fc10d

          SHA512

          5a10a2f096adce6e7db3a40bc3ea3fd44d602966e606706ee5a780703f211de7f77656c79c296390baee1e008dc3ce327eaaf5d78bbae20108670c5bc809a190

        • memory/1920-141-0x0000000006450000-0x000000000645F000-memory.dmp

          Filesize

          60KB

        • memory/4664-132-0x0000000000400000-0x00000000004DC000-memory.dmp

          Filesize

          880KB

        • memory/4664-136-0x0000000000400000-0x00000000004DC000-memory.dmp

          Filesize

          880KB

        • memory/4664-138-0x0000000000400000-0x00000000004DC000-memory.dmp

          Filesize

          880KB