Analysis

  • max time kernel
    153s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/09/2022, 04:27

General

  • Target

    CheatHack.exe

  • Size

    3.2MB

  • MD5

    0663c64e9f7f0709d8c41e12470078d9

  • SHA1

    edcf414fd1e4ef3019138be0300c59c7fea63d11

  • SHA256

    4b54315d1ba8c2ff782c0e2606ef2df30ee080162285b4db3831838eac617b35

  • SHA512

    81f5f398c43847e14683858544758f16339acf96b70927c281cd65fe2aaf3057a4b7395f32fa05a977872dc2d942d4ee4de0f44882d1a0b28cc1cf22e96bdaf8

  • SSDEEP

    49152:nG5UfgJF6rmQhlHWqyz6F3bkgHDmDkjBqTvw1BN1V3RsoihuafksZhvHi6lwhNii:nG5QgJRwlgzSbH2TTvw1bmuBUCYwbii

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 7 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks for any installed AV software in registry 1 TTPs 9 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 22 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 4 IoCs
  • Modifies data under HKEY_USERS 1 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CheatHack.exe
    "C:\Users\Admin\AppData\Local\Temp\CheatHack.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2288
    • C:\Users\Admin\AppData\Local\Temp\7zS0F8E7477\GenericSetup.exe
      .\GenericSetup.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks for any installed AV software in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:5092
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /C ""C:\Users\Admin\Downloads\kodi-19.1-Matrix-x64.exe""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3168
        • C:\Users\Admin\Downloads\kodi-19.1-Matrix-x64.exe
          "C:\Users\Admin\Downloads\kodi-19.1-Matrix-x64.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:900
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /C ""Hola-Setup-H2OUS-Installer-Agreed.exe" --silent --no-rmt-conf --run-once"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1172
        • C:\Users\Admin\AppData\Local\Temp\GenericSetup.exe_1663655291\Hola-Setup-H2OUS-Installer-Agreed.exe
          "Hola-Setup-H2OUS-Installer-Agreed.exe" --silent --no-rmt-conf --run-once
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4928
          • C:\Users\Admin\AppData\Local\Temp\GenericSetup.exe_1663655291\Hola-Setup-H2OUS-Installer-Agreed.exe
            "Hola-Setup-H2OUS-Installer-Agreed.exe" --monitor 1868
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1820
          • C:\Users\Admin\AppData\Local\Temp\Hola-Setup-x64-1.202.120.exe
            "C:\Users\Admin\AppData\Local\Temp\Hola-Setup-x64-1.202.120.exe" --silent --agree --force-appid win_hola.h2ous.hola.org --app vpn --no-run-uis --no-rmt-conf --no-updater --no-hola-cr --hola-domain holavpninstaller.com
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:4024
            • C:\Program Files\Hola\app\net_updater64.exe
              "C:\Program Files\Hola\app\net_updater64.exe" --install win_hola.h2ous.hola.org
              6⤵
              • Executes dropped EXE
              PID:4472
  • C:\Program Files\Hola\app\net_updater64.exe
    "C:/Program Files/Hola/app/net_updater64.exe" --updater win_hola.h2ous.hola.org
    1⤵
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    PID:3728

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Hola\app\lum_sdk64.dll

    Filesize

    6.7MB

    MD5

    5ad6e8ecfdb608529f0891eeba0f73db

    SHA1

    8e818fd49aa5cbf27bcd8e66331f3faaa0778359

    SHA256

    81856738dc41a88b0c023b239dd3818fce4def2e0ff789879b3a9c8bc4d8fd21

    SHA512

    82af2292b8735dc6c43e2665def76b4d4c3bb3ca08e8063152c2e7f956a3e21574540d79986ec8ba97a549efaed8f4676b54d6568b43096c93432d72176b1e41

  • C:\Program Files\Hola\app\net_updater64.exe

    Filesize

    9.3MB

    MD5

    22e841e5e835fe7136437afd527ef58e

    SHA1

    dfd79532c8e46ed7dfb74361ad39e66e4a198ea4

    SHA256

    1e74393bf7c062d5f2b8af7c22ca30eb8dba31f655395ccd51d41fb623e0a144

    SHA512

    177d9c6102f71eb96c73dc5890730b6397f25a2a91d136dfdaa8153c8f43cb5ac82f2c1cbe0ccd0c871b9ad6fc7a8285020d42430b39cdf64edcb2e1136fb49e

  • C:\Program Files\Hola\app\net_updater64.exe

    Filesize

    9.3MB

    MD5

    22e841e5e835fe7136437afd527ef58e

    SHA1

    dfd79532c8e46ed7dfb74361ad39e66e4a198ea4

    SHA256

    1e74393bf7c062d5f2b8af7c22ca30eb8dba31f655395ccd51d41fb623e0a144

    SHA512

    177d9c6102f71eb96c73dc5890730b6397f25a2a91d136dfdaa8153c8f43cb5ac82f2c1cbe0ccd0c871b9ad6fc7a8285020d42430b39cdf64edcb2e1136fb49e

  • C:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\20220920_063017_01_install_1.323.197.log

    Filesize

    1B

    MD5

    68b329da9893e34099c7d8ad5cb9c940

    SHA1

    adc83b19e793491b1c6ea0fd8b46cd9f32e592fc

    SHA256

    01ba4719c80b6fe911b091a7c05124b64eeece964e09c058ef8f9805daca546b

    SHA512

    be688838ca8686e5c90689bf2ab585cef1137c999b48c70b92f67a5c34dc15697b5d11c982ed6d71be1e1e7f7b4e0733884aa97c3f7a339a8ed03577cf74be09

  • C:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\lum_sdk_install_id

    Filesize

    33B

    MD5

    8799dd7db6874bb94d271eb721bdc6df

    SHA1

    7d7b07c08fdc437b1788d49e2c678135f2f53dfb

    SHA256

    3cb73e6a5a1db41d39ae0a386d624eedf3d8e3cb4cdc5d1f51e08b26b8a1902c

    SHA512

    e537aadb9c701a258b2989dd7f1292f22b2db34453b9eb11ba35f4016a4fb181168a6e0a7ee24689f1943eebb9109c1f47054beb5bdce5a825b2154506d8353b

  • C:\Users\Admin\AppData\Local\Temp\7zS0F8E7477\GenericSetup.exe

    Filesize

    8.1MB

    MD5

    fffd5cc10b8005fb12c592d13fead02f

    SHA1

    ee4a4852528b41d13a90520c0df3d6c13c77d30c

    SHA256

    246b1ee6e676d9e0012b5f9f5b68d98b4bb81597d6c739ff8377e1af1fbeafa4

    SHA512

    54543275ab0421ffc4ac496f72ccb8aa7534307dda1e843ea241f0222d75b21e06c1024919e2c2ea0e1dc49923dbacc4bf93fa200a90c6650f19bd410717c29f

  • C:\Users\Admin\AppData\Local\Temp\7zS0F8E7477\GenericSetup.exe

    Filesize

    8.1MB

    MD5

    fffd5cc10b8005fb12c592d13fead02f

    SHA1

    ee4a4852528b41d13a90520c0df3d6c13c77d30c

    SHA256

    246b1ee6e676d9e0012b5f9f5b68d98b4bb81597d6c739ff8377e1af1fbeafa4

    SHA512

    54543275ab0421ffc4ac496f72ccb8aa7534307dda1e843ea241f0222d75b21e06c1024919e2c2ea0e1dc49923dbacc4bf93fa200a90c6650f19bd410717c29f

  • C:\Users\Admin\AppData\Local\Temp\7zS0F8E7477\GenericSetup.exe.config

    Filesize

    814B

    MD5

    fd63ee3928edd99afc5bdf17e4f1e7b6

    SHA1

    1b40433b064215ea6c001332c2ffa093b1177875

    SHA256

    2a2ddbdc4600e829ad756fd5e84a79c0401fa846ad4f2f2fb235b410e82434a9

    SHA512

    1925cde90ee84db1e5c15fa774ee5f10fa368948df7643259b03599ad58cfce9d409fd2cd752ff4cbca60b4bbe92b184ff92a0c6e8b78849c4497d38266bd3b4

  • C:\Users\Admin\AppData\Local\Temp\GenericSetup.exe_1663655291\Hola-Setup-H2OUS-Installer-Agreed.exe

    Filesize

    1.4MB

    MD5

    cf895d951da6690db4a66c796dca625c

    SHA1

    a58dc570898eb28042a59149df78801cf8c32158

    SHA256

    dc1f5e80db1729cea32d31dc95f8d0d352a7532a3cf0f2a0d887030eaa6061e9

    SHA512

    dfed216ffab4d2ae62d50e8912439e42c47fdd7e4d6460218d85f1bd8cb5ef42fea33153411e22f5f9dbeb366be10502141b38bbc7d932a56364a84b1cf59b45

  • C:\Users\Admin\AppData\Local\Temp\GenericSetup.exe_1663655291\Hola-Setup-H2OUS-Installer-Agreed.exe

    Filesize

    1.4MB

    MD5

    cf895d951da6690db4a66c796dca625c

    SHA1

    a58dc570898eb28042a59149df78801cf8c32158

    SHA256

    dc1f5e80db1729cea32d31dc95f8d0d352a7532a3cf0f2a0d887030eaa6061e9

    SHA512

    dfed216ffab4d2ae62d50e8912439e42c47fdd7e4d6460218d85f1bd8cb5ef42fea33153411e22f5f9dbeb366be10502141b38bbc7d932a56364a84b1cf59b45

  • C:\Users\Admin\AppData\Local\Temp\GenericSetup.exe_1663655291\Hola-Setup-H2OUS-Installer-Agreed.exe

    Filesize

    1.4MB

    MD5

    cf895d951da6690db4a66c796dca625c

    SHA1

    a58dc570898eb28042a59149df78801cf8c32158

    SHA256

    dc1f5e80db1729cea32d31dc95f8d0d352a7532a3cf0f2a0d887030eaa6061e9

    SHA512

    dfed216ffab4d2ae62d50e8912439e42c47fdd7e4d6460218d85f1bd8cb5ef42fea33153411e22f5f9dbeb366be10502141b38bbc7d932a56364a84b1cf59b45

  • C:\Users\Admin\AppData\Local\Temp\GenericSetup.exe_1663655291\sciter32.dll

    Filesize

    5.6MB

    MD5

    b431083586e39d018e19880ad1a5ce8f

    SHA1

    3bbf957ab534d845d485a8698accc0a40b63cedd

    SHA256

    b525fdcc32c5a359a7f5738a30eff0c6390734d8a2c987c62e14c619f99d406b

    SHA512

    7805a3464fcc3ac4ea1258e2412180c52f2af40a79b540348486c830a20c2bbed337bbf5f4a8926b3ef98c63c87747014f5b43c35f7ec4e7a3693b9dbd0ae67b

  • C:\Users\Admin\AppData\Local\Temp\Hola-Setup-x64-1.202.120.exe

    Filesize

    8.2MB

    MD5

    e7ea3f0f655f80b2d982af77660fdd72

    SHA1

    9c0875ade80f7b3126e89b3a743e68b95ffc11ab

    SHA256

    98d8c88a67ec3d235a6eb5748bd4342469da1435be054a945aa3c441625125a5

    SHA512

    274b0fe98e5fd13415cb02cc7f3bd5fa8a79aabbaf2ed79a5d38716a8b2ff9ebd6a204f8aea8270f8fed2fdb233fc7ec9472922bc2c942726afdc5d901a35184

  • C:\Users\Admin\AppData\Local\Temp\Hola-Setup-x64-1.202.120.exe

    Filesize

    8.2MB

    MD5

    e7ea3f0f655f80b2d982af77660fdd72

    SHA1

    9c0875ade80f7b3126e89b3a743e68b95ffc11ab

    SHA256

    98d8c88a67ec3d235a6eb5748bd4342469da1435be054a945aa3c441625125a5

    SHA512

    274b0fe98e5fd13415cb02cc7f3bd5fa8a79aabbaf2ed79a5d38716a8b2ff9ebd6a204f8aea8270f8fed2fdb233fc7ec9472922bc2c942726afdc5d901a35184

  • C:\Users\Admin\AppData\Local\Temp\nsu508D.tmp\System.dll

    Filesize

    11KB

    MD5

    fbe295e5a1acfbd0a6271898f885fe6a

    SHA1

    d6d205922e61635472efb13c2bb92c9ac6cb96da

    SHA256

    a1390a78533c47e55cc364e97af431117126d04a7faed49390210ea3e89dd0e1

    SHA512

    2cb596971e504eaf1ce8e3f09719ebfb3f6234cea5ca7b0d33ec7500832ff4b97ec2bbe15a1fbf7e6a5b02c59db824092b9562cd8991f4d027feab6fd3177b06

  • C:\Users\Admin\AppData\Local\Temp\nsu508D.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    ab101f38562c8545a641e95172c354b4

    SHA1

    ec47ac5449f6ee4b14f6dd7ddde841a3e723e567

    SHA256

    3cdf3e24c87666ed5c582b8b028c01ee6ac16d5a9b8d8d684ae67605376786ea

    SHA512

    72d4b6dc439f40b7d68b03353a748fc3ad7ed10b0401741c5030705d9b1adef856406075e9ce4f1a08e4345a16e1c759f636c38ad92a57ef369867a9533b7037

  • C:\Users\Admin\Downloads\kodi-19.1-Matrix-x64.exe

    Filesize

    65.5MB

    MD5

    c390f6d282e2f5b97ad69eda523e40b7

    SHA1

    1fba08349f180fab6bde8ed4f1001ed8903a1697

    SHA256

    ecbb43dad45d3442d3dec14c66429766f19ea86ac050ad86c2edd7e20313b4df

    SHA512

    2aff9913ae55c2106145d1066d52f3cb4be9689fda8c8a7d8d67e5f10efa303668c7fa4fb74e8adcb706c198967bfb3f5039d697121a995e385d0397261ec756

  • C:\Users\Admin\Downloads\kodi-19.1-Matrix-x64.exe

    Filesize

    65.5MB

    MD5

    c390f6d282e2f5b97ad69eda523e40b7

    SHA1

    1fba08349f180fab6bde8ed4f1001ed8903a1697

    SHA256

    ecbb43dad45d3442d3dec14c66429766f19ea86ac050ad86c2edd7e20313b4df

    SHA512

    2aff9913ae55c2106145d1066d52f3cb4be9689fda8c8a7d8d67e5f10efa303668c7fa4fb74e8adcb706c198967bfb3f5039d697121a995e385d0397261ec756

  • memory/4024-159-0x00007FF6B8F20000-0x00007FF6BB70E000-memory.dmp

    Filesize

    39.9MB

  • memory/4928-156-0x0000000006380000-0x00000000063A2000-memory.dmp

    Filesize

    136KB

  • memory/4928-152-0x0000000000560000-0x00000000006C4000-memory.dmp

    Filesize

    1.4MB

  • memory/4928-153-0x0000000005A10000-0x0000000005A66000-memory.dmp

    Filesize

    344KB

  • memory/5092-147-0x0000000001D80000-0x0000000001D8A000-memory.dmp

    Filesize

    40KB

  • memory/5092-139-0x0000000009360000-0x00000000093F2000-memory.dmp

    Filesize

    584KB

  • memory/5092-138-0x0000000008D10000-0x00000000092B4000-memory.dmp

    Filesize

    5.6MB

  • memory/5092-137-0x00000000068F0000-0x0000000006956000-memory.dmp

    Filesize

    408KB

  • memory/5092-136-0x0000000000B00000-0x0000000001310000-memory.dmp

    Filesize

    8.1MB